Searching for RPC Functions to Coerce Authentications in Microsoft Protocols
...In this talk, we’ll explore a way to automate this process by parsing Microsoft’s OpenSpecs online documentation as well as Interface Definition Language code. After that, we’ll use the gathered data to automatically find RPC calls potentially triggering authentications and generate python proof of concept code to trigger them remotely. Using this method, we find existing PrinterBug, PetitPotam, ShadowCoerce and DFSCoerce vulnerabilities in a matter of minutes....
By: Remi Gascou (Podalirius)
Full Abstract and Presentation Materials:
#searching-for-rpc-functions-to-coerce-authentications-in-microsoft-protocols-29154
0 views
0
0
7 days ago 00:05:19 4
Love Punishment - Esso Mandela - Album: Electro Symphony
7 days ago 00:03:02 2
Stay With Me - Esso Mandela - Album: DeepHouse Odyssey
7 days ago 00:04:36 2
Nothing Is Real - Esso Mandela - Album: DeepHouse Odyssey