enj5oy
enj5oy
@dhn If Web Enrollment is present on port 443, it indicates that HTTPS is being used. Therefore, attempting to relay from HTTPS to LDAP would be unsuccessful, correct?
@c3c maybe this commit break trusts json file? https://github.com/BloodHoundAD/BloodHound/commit/7d3c0fb02cee29f62f18ceb3f9460ce51c8b4a0e
@NtAlexio2 
@NtAlexio2 I start ntlmrelayx  Then i coerce authentication from domain admin to attacker host  Then i run net.py through proxychains
@anadrianmanrique dcomexec with kerberos auth not work for me with any parameters.
Thanks, all work. Maybe change this information in help? 
> Hello, I'm aware of this issue which is a limitation of my `mimikerberos` library. It is begin updated, and will be pushed in a new release soon(ish) Thanks for...
Thanks, i will try this on engagement
@skelsec I have ticket to child.contoso.local\lowpriv user and can connect to dc1.contoso.local(192.168.0.3) I try connect with msldap (asyauth==0.0.20)  With impacket ticket work 
@Sq00ky hello, when i use cross-forest request from child domain to parent with NTLM auth, all fine. When i use kerberos auth, ticket request from -dc-ip but ticket need request...