<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://www.chudamax.com//</id><title>I understand</title><subtitle>Personal blog, information security research </subtitle> <updated>2025-07-24T12:25:32+02:00</updated> <author> <name>Maksim Chudakov</name> <uri>https://www.chudamax.com//</uri> </author><link rel="self" type="application/atom+xml" href="https://www.chudamax.com//feed.xml"/><link rel="alternate" type="text/html" hreflang="en-US" href="https://www.chudamax.com//"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 Maksim Chudakov </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>User Impersonation: Living Off the Land with the SCCM Client</title><link href="https://www.chudamax.com//posts/sccmexec-user-impersonation/" rel="alternate" type="text/html" title="User Impersonation: Living Off the Land with the SCCM Client" /><published>2025-07-24T10:23:03+02:00</published> <updated>2025-07-24T12:24:14+02:00</updated> <id>https://www.chudamax.com//posts/sccmexec-user-impersonation/</id> <content src="https://www.chudamax.com//posts/sccmexec-user-impersonation/" /> <author> <name>Maksim Chudakov</name> </author> <category term="Research" /> <summary> TL;DR Most classic impersonation techniques are well-known and flagged by EDR. The SCCM SMS Agent Host (ccmexec.exe) impersonates users by design, launching trusted binaries in their sessions. By modifying specific SCCM binaries, this enables code execution under user context without custom APIs or alerts. Discovery While testing common impersonation methods, most were immediately flagged by... </summary> </entry> <entry><title>HackTheBox - BroScience | Walkthrough</title><link href="https://www.chudamax.com//posts/htb-broscience/" rel="alternate" type="text/html" title="HackTheBox - BroScience | Walkthrough" /><published>2023-04-08T19:00:03+02:00</published> <updated>2023-04-08T19:32:41+02:00</updated> <id>https://www.chudamax.com//posts/htb-broscience/</id> <content src="https://www.chudamax.com//posts/htb-broscience/" /> <author> <name>Maksim Chudakov</name> </author> <category term="HTB" /> <summary> BroScience Overview BroScience is a medium-difficulty challenge focusing on web-related vulnerabilities, source code review, and custom code writing for exploitation. This box serves as excellent preparation for the AWAE course, covering many of the same concepts and techniques. The exploitation involves registering a new user, activating the account, logging in, and exploiting a deseriali... </summary> </entry> <entry><title>HackTheBox - Sekhmet | Writeup</title><link href="https://www.chudamax.com//posts/htb-sekhmet/" rel="alternate" type="text/html" title="HackTheBox - Sekhmet | Writeup" /><published>2023-04-01T14:23:03+02:00</published> <updated>2023-04-02T05:15:25+02:00</updated> <id>https://www.chudamax.com//posts/htb-sekhmet/</id> <content src="https://www.chudamax.com//posts/htb-sekhmet/" /> <author> <name>Maksim Chudakov</name> </author> <category term="HTB" /> <summary> Sekhmet Overview Sekhmet is an insane difficulty box: a lot of enumeration, exploitation of NodeJS deserialization, ModSecurity and Windows AppLocker bypass, weak ZIP encryption types, pivoting, dealing with authentication type restrictions, NTLMv2 hashes brute force, and other interesting things. Enumeration Let’s add sekhmet’s IP to the /etc/hosts file. Starting from a standard Nmap sc... </summary> </entry> <entry><title>Kerberos 102 - Delegation</title><link href="https://www.chudamax.com//posts/kerberos-102-delegation/" rel="alternate" type="text/html" title="Kerberos 102 - Delegation" /><published>2023-03-23T10:23:03+01:00</published> <updated>2023-05-08T10:57:32+02:00</updated> <id>https://www.chudamax.com//posts/kerberos-102-delegation/</id> <content src="https://www.chudamax.com//posts/kerberos-102-delegation/" /> <author> <name>Maksim Chudakov</name> </author> <category term="AD" /> <summary> [Part 1] - Kerberos 102 - Overview [Part 2] - Kerberos 102 - Delegation [Part 3] - Kerberos 102 - Cross-Realm Operations Overview Kerberos delegation is a feature in the Kerberos authentication protocol that allows services to act on behalf of users. For example, a web server might use Kerberos delegation to authenticate a user and then use that authentication ticket to access a back-end da... </summary> </entry> <entry><title>Kerberos 102 - Cross-Realm Operations</title><link href="https://www.chudamax.com//posts/kerberos-102-cross-realm-operations/" rel="alternate" type="text/html" title="Kerberos 102 - Cross-Realm Operations" /><published>2023-03-23T09:23:03+01:00</published> <updated>2023-05-08T11:01:11+02:00</updated> <id>https://www.chudamax.com//posts/kerberos-102-cross-realm-operations/</id> <content src="https://www.chudamax.com//posts/kerberos-102-cross-realm-operations/" /> <author> <name>Maksim Chudakov</name> </author> <category term="AD" /> <summary> [Part 1] - Kerberos 102 - Overview [Part 2] - Kerberos 102 - Delegation [Part 3] - Kerberos 102 - Cross-Realm Operations Overview Kerberos cross-realm authentication, is a mechanism that enables users to authenticate and access resources across multiple Kerberos realms (domains). To enable cross-domain authentication, the Kerberos administrators in each realm establish a trust relationship ... </summary> </entry> </feed>
