👀Turns out MS-EVEN can do a lot more than NULL auth:
In addition to leaking environment variables, it is possible to coerce authentication from arbitrary logged on users* 🤯
*If you are willing to trigger Windows Defender.
In May 2025 Sergey Bureev (@TCross) released his research on coercion using MS-EVEN, which by itself only uses NULL authentication, as the service runs as network restricted LOCAL SERVICE.
By intentionally coercing a host to open a share with a virus (or an EICAR test file), Windows Defender re-connects with computer account credentials in order to quarantine/delete it. 🦠😷
We then discovered, that if Defender is not allowed to delete the file, it will try to re-connect with the account that triggered the coercion.
Where do the credentials come from? Well, if the same user is also interactively logged on, Defender will simply steal their token 🥷🏼
If you already own the computer account, and want to coerce a logged-in admin, you can use an S4U2self impersonation ticket for that user.
So if Defender prevents you from executing code on a computer with an admin, just let it snitch on the admin with a relayable NTLMv2-Hash🤯
Another interesting tidbit was that the share path can contain environment variables, which are expanded by the host.
This could reveal system level variables, which could be interesting in some configurations.
Check out our Impacket PR that adds SMB signing support (NTLM and Kerberos) to smbserver to allow Windows 11 clients that require signing by default to connect: github.com/fortra/impacke…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
We want to highlight ✨adauth✨, our Go library for AD authentication powering out latest tool keycred 🔐:
We hope to lay a foundation for a healthy AD security tool ecosystem in Go by providing flexible authentication and we'll show you how...
1/6🧵github.com/RedTeamPentest…
First of all, adauth provides re-usable authentication CLI arguments (similar to Impacket) for convenience and consistency between your tools:
2/6🧵
It automatically gathers the necessary info, like DC from SRV lookup or like the SPN from a reverse lookup when using Kerberos with IPs 🔍:
3/6🧵