RedTeam Pentesting Profile picture
Aug 19 7 tweets 2 min read Read on X
👀Turns out MS-EVEN can do a lot more than NULL auth:

In addition to leaking environment variables, it is possible to coerce authentication from arbitrary logged on users* 🤯

*If you are willing to trigger Windows Defender.
In May 2025 Sergey Bureev (@TCross) released his research on coercion using MS-EVEN, which by itself only uses NULL authentication, as the service runs as network restricted LOCAL SERVICE.

habr.com/ru/companies/t…
By intentionally coercing a host to open a share with a virus (or an EICAR test file), Windows Defender re-connects with computer account credentials in order to quarantine/delete it. 🦠😷 Image
We then discovered, that if Defender is not allowed to delete the file, it will try to re-connect with the account that triggered the coercion.

Where do the credentials come from? Well, if the same user is also interactively logged on, Defender will simply steal their token 🥷🏼
If you already own the computer account, and want to coerce a logged-in admin, you can use an S4U2self impersonation ticket for that user.

So if Defender prevents you from executing code on a computer with an admin, just let it snitch on the admin with a relayable NTLMv2-Hash🤯 Image
Another interesting tidbit was that the share path can contain environment variables, which are expanded by the host.

This could reveal system level variables, which could be interesting in some configurations. Image
Check out our Impacket PR that adds SMB signing support (NTLM and Kerberos) to smbserver to allow Windows 11 clients that require signing by default to connect:
github.com/fortra/impacke…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with RedTeam Pentesting

RedTeam Pentesting Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @RedTeamPT

Feb 21
We want to highlight ✨adauth✨, our Go library for AD authentication powering out latest tool keycred 🔐:


We hope to lay a foundation for a healthy AD security tool ecosystem in Go by providing flexible authentication and we'll show you how...
1/6🧵github.com/RedTeamPentest…
First of all, adauth provides re-usable authentication CLI arguments (similar to Impacket) for convenience and consistency between your tools:
2/6🧵 Image
It automatically gathers the necessary info, like DC from SRV lookup or like the SPN from a reverse lookup when using Kerberos with IPs 🔍:
3/6🧵 Image
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(