New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain

A new kind of Windows NTLM relay attack dubbed DFSCoerce has been uncovered that leverages the Distributed File System (DFS): Namespace Management Protocol (MS-DFSNM) to seize control of a domain. "Spooler service disabled, RPC filters installed to prevent PetitPotam and File Server VSS Agent Service not installed but you still want to relay [Domain Controller authentication to [Active Directory

from The Hacker News https://ift.tt/SYnOqiF
via IFTTT

Comments

Popular posts from this blog

Critical Bugs Reported in Popular Open Source PJSIP SIP and Media Stack

Experts Reveal Over 150 Ways to Steal Control of 58 Android Stalkerware Apps