Skip to content

From flat networks to locked up domains with tiering models#2042

Open
carlospolop wants to merge 1 commit intomasterfrom
update_From_flat_networks_to_locked_up_domains_with_tieri_20260320_185156
Open

From flat networks to locked up domains with tiering models#2042
carlospolop wants to merge 1 commit intomasterfrom
update_From_flat_networks_to_locked_up_domains_with_tieri_20260320_185156

Conversation

@carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

  • Blog URL: https://sensepost.com/blog/2026/from-flat-networks-to-locked-up-domains-with-tiering-models/
  • Blog Title: From flat networks to locked up domains with tiering models
  • Suggested Section: Windows Hardening -> Windows Local Privilege Escalation (Access Token impersonation / token theft) and/or Active Directory Methodology -> Lateral Movement (Pass-the-Hash with NetExec; RDP Shadowing abuse; Scheduled Tasks run-as when user is logged on; CredUI prompt phishing on-host)

🎯 Content Summary

The post explains (from an internal pentest/red-team perspective) why “flat” Windows/AD networks typically collapse after a single foothold, and how applying a tiering model (privilege + network segmentation) reduces credential exposure and lateral movement. It demonstrates multiple ways to compromise or usurp privileged identities even when classic LSASS dumping is detected, emphasizing that attackers often don’t need the password itself—only the victim’s security context.

1) Wh...

🔧 Technical Details

LSASS → NT hash extraction → Pass-the-Hash at scale: When privileged users authenticate on a compromised host, LSASS may contain cleartext credentials, NT hashes (MD4-derived), and Kerberos tickets. Dump LSASS (e.g., with Mimikatz) to recover an NTLM hash, then authenticate to other hosts (including DCs) using Pass-the-Hash with frameworks like NetExec. This enables rapid lateral movement without knowing the plaintext password.

Access token impersonation (security-context usurpation): Windows creates a primary access token at logon (SID, groups, privileges) and duplicates it into child processes. If an attacker can locate/duplicate a privileged token and spawn a new process bound to it, Windows authorizes actions as the victim without re-checking the password and without touching LSASS. Tools such as SensePost’s Impersonate (integrated into NetExec) automate token discovery/hijacking and command execution under the stolen context.

Shadow RDP...

🤖 Agent Actions

Updated rdp-sessions-abuse.md with the blog’s missing technical content around abusing an already logged-on victim context: Shadow RDP policy values and commands, scheduled-task execution as a logged-on user without their password, CredUI prompt abuse from the victim session, and requesting a PFX in the victim context for certificate-based AD auth.

I kept it to one file, because the repo already covers token impersonation and generic token abuse elsewhere, while this page was the best fit for the session-bound tradecraft that was not yet documented together. I also added a proper ## References section at the end with the SensePost post and relevant NetExec/Microsoft links.

Verification: reviewed the final diff and confirmed the new material is only in that file and does not duplicate the stronger existing token-focused pages.


This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://sensepost.com/blog/2026/from-flat-networks-to-locked-up-domains-with-tiering-models/

Content Categories: Based on the analysis, this content was categorized under "Windows Hardening -> Windows Local Privilege Escalation (Access Token impersonation / token theft) and/or Active Directory Methodology -> Lateral Movement (Pass-the-Hash with NetExec; RDP Shadowing abuse; Scheduled Tasks run-as when user is logged on; CredUI prompt phishing on-host)".

Repository Maintenance:

  • MD Files Formatting: 954 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant