<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Internal-Pentest on ioctl</title><link>https://ioctl.lol/tags/internal-pentest/</link><description>Recent content in Internal-Pentest on ioctl</description><generator>Hugo</generator><language>en</language><copyright>ioctl</copyright><lastBuildDate>Mon, 08 Dec 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://ioctl.lol/tags/internal-pentest/index.xml" rel="self" type="application/rss+xml"/><item><title>When Every Relay Fails: Breaking Through with CVE-2025-33073</title><link>https://ioctl.lol/research/when-every-relay-fails/</link><pubDate>Mon, 08 Dec 2025 00:00:00 +0000</pubDate><guid>https://ioctl.lol/research/when-every-relay-fails/</guid><description>&lt;h2 id="the-setup-that-looked-easy">The Setup That Looked Easy&lt;/h2>
&lt;p>Internal pentest. Low-privileged domain credentials provided by the client. Standard assumed-breach scenario.&lt;/p>
&lt;p>Initial recon painted a promising picture:&lt;/p>
&lt;pre tabindex="0">&lt;code>nxc smb 10.10.10.0/24 -u testuser -p &amp;#39;Provided2025!&amp;#39; --gen-relay-list relay.txt
&lt;/code>&lt;/pre>&lt;p>Both Domain Controllers — &lt;strong>SMB signing disabled&lt;/strong>. Coercion scan confirmed every flavor was on the menu:&lt;/p>
&lt;pre tabindex="0">&lt;code>nxc smb 10.10.10.11 -u testuser -p &amp;#39;Provided2025!&amp;#39; -M coerce_plus
SMB 10.10.10.11 445 DC02 VULNERABLE, DFSCoerce
SMB 10.10.10.11 445 DC02 VULNERABLE, PetitPotam
SMB 10.10.10.11 445 DC02 VULNERABLE, PrinterBug
SMB 10.10.10.11 445 DC02 VULNERABLE, MSEven
&lt;/code>&lt;/pre>&lt;p>SMB signing off on DCs + every coercion technique working = textbook relay scenario. Should be straightforward. Right?&lt;/p></description></item></channel></rss>