Tuesday, June 21, 2022

New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain

A new kind of Windows NTLM relay attack dubbed DFSCoerce has been uncovered that leverages the Distributed File System (DFS): Namespace Management Protocol (MS-DFSNM) to seize control of a domain. "Spooler service disabled, RPC filters installed to prevent PetitPotam and File Server VSS Agent Service not installed but you still want to relay [Domain Controller authentication to [Active Directory
https://thehackernews.com/2022/06/new-ntlm-relay-attack-lets-attackers.html?utm_source=dlvr.it&utm_medium=blogger

No comments:

Post a Comment