Clément Labro
@itm4n.bsky.social
430 followers 58 following 15 posts
Pentest & Windows security research
Posts Media Videos Starter Packs
itm4n.bsky.social
🆕 New blog post!

"Offline Extraction of Symantec Account Connectivity Credentials (ACCs)"

Following my previous post on the subject, here is how to extract ACCs purely offline.

👉 itm4n.github.io/offline-extr...

#redteam #pentesting
Screenshot showing the output of the proof-of-concept tool "SMAStorageDump", where ACCs are dully decrypted.
itm4n.bsky.social
🆕 New blog post!

"Checking for Symantec Account Connectivity Credentials (ACCs) with PrivescCheck"

This blog post is not so much about PrivescCheck, but rather brings additional insight to the original article published by MDSec on the subject.

👉 itm4n.github.io/checking-sym...

#redteam
Sample output of PrivescCheck showing the information collected about the Symantec Management Agent (SMA).
itm4n.bsky.social
🆕 New blog post! It's a rather short one, nothing crazy. Just wanted to share a random finding I made recently. 🤷‍♂️

'Hijacking the Windows "MareBackup" Scheduled Task for Privilege Escalation'

👉 blog.scrt.ch/2025/05/20/h...

#pentest #pentesting #redteam #windows #privilegeescalation
Hijacking the Windows “MareBackup” Scheduled Task for Privilege Escalation – SCRT Team Blog
blog.scrt.ch
itm4n.bsky.social
Another example of a Windows 0-day found with PrivescCheck. Congrats to Compass Security for investigating the issue and exploiting it. 👏

blog.compass-security.com/2025/04/3-mi...
itm4n.bsky.social
You're absolutely right! 😬
Thanks for your message. I'll do that. 🙂
This whole DLL thing is essentially a dirty hack anyway.
itm4n.bsky.social
In this blog post, I explain how I was able to create a PowerShell console in C/C++, and disable all its security features (AMSI, logging, transcription, execution policy, CLM) in doing so. 💪

👉 blog.scrt.ch/2025/02/18/r...
Screenshot showing the execution of the proof-of-concept named PowerChell in comparison to a typical PowerShell prompt. In particular, it shows that PowerChell is able to bypass the Constrained Language Mode (CLM).
itm4n.bsky.social
Really great blog post about bypassing BitLocker using "PXE soft reboot" (even if PXE boot is disabled in the BIOS).

"Windows BitLocker -- Screwed without a Screwdriver"

👉 neodyme.io/en/blog/bitl...
👉 media.ccc.de/v/38c3-windo...
Windows BitLocker -- Screwed without a Screwdriver
Breaking up-to-date Windows 11 BitLocker encryption -- on-device but software-only
neodyme.io
itm4n.bsky.social
I updated the diagram representing the different Point and Print configurations and their exploitation on my blog.

Hopefully, this should provide a better understanding of the whole "PrintNightmare" situation to both defenders and red teamers. 🤞
Diagram representing the various Windows Point and Print configurations that reintroduce the PrintNightmare exploit variants.
itm4n.bsky.social
Interestingly enough, MS disabled the "Use my Windows user account" checkbox when connecting to Wi-Fi on the lock screen to address CVE-2024-38143 in the August Patch Tuesday.

This change completely remediates the "Airstrike" attack as well. 🤯

support.microsoft.com/en-us/topic/...
August 13, 2024—KB5041585 (OS Builds 22621.4037 and 22631.4037) - Microsoft SupportYour Privacy Choices Opt-Out Icon
support.microsoft.com
Reposted by Clément Labro
decoder-it.bsky.social
I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...
itm4n.bsky.social
Thanks!
Yes, I already thought about doing something like this, and I already took a look at cross-references to find the offset of the object. I didn't take the time to check older versions though, there might be some diffs to take into consideration. There is clearly more to work on. :)
itm4n.bsky.social
🆕 New blog post! "Exploiting KsecDD through Server Silos"

In my latest mini research project, I've been working with my teammate @PMa1n (X) on extending the work of @floesen_ (X) on the KsecDD driver. I'm thrilled to finally share the results.

👉 blog.scrt.ch/2024/11/11/e...
Exploiting KsecDD through Server Silos – SCRT Team Blog
blog.scrt.ch
itm4n.bsky.social
"A Trick, The Story of CVE-2024-26230" by k0shl

Write-up about the discovery and exploitation of a UAF vulnerability in the Windows Telephony service + CFG bypass leading to local privilege escalation. 🔥🔥🔥

whereisk0shl.top/post/a-trick...
A trick, the story of CVE-2024-26230
whereisk0shl.top
itm4n.bsky.social
🆕​ New PrivescCheck extended check!

ℹ️​ The script can now enumerate dangerous default file extension associations, such as '.bat' or '.wsh'.

⚠️​ A manual review of the result is always recommended, but for the most part, it should be fine.

github.com/itm4n/Prives...
GitHub - itm4n/PrivescCheck: Privilege Escalation Enumeration Script for Windows
Privilege Escalation Enumeration Script for Windows - itm4n/PrivescCheck
github.com