Skip to content

Make Sure to Use SOAP(y) – An Operators Guide to Stealthy AD... #1189

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

carlospolop
Copy link
Collaborator

πŸ€– Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

πŸ“ Source Information

🎯 Content Summary

Active Directory Web Services (ADWS)

Active Directory Web Services (ADWS) runs by default on domain controllers over TCP port 9389, exposing LDAP data via layered Microsoft .NET protocols (MC-NBFX β†’ MC-NBFSE β†’ MS-NNS β†’ MC-NMF) rather than HTTP/HTTPS. This allows attacker reconnaissance without touching standard LDAP ports.


SoaPy: Native Python Re-implementation

SoaPy (πŸ”§ Technical Details

Stealthy ADWS Enumeration via SoaPy:
SoaPy recreates Microsoft’s SOAP-based .NET framing protocols (MC-NBFX, MC-NBFSE, MS-NNS, MC-NMF) in Python, enabling constrained Active Directory enumeration over TCP/9389 on Linux. By proxying through a SOCKS C2 channel, operators can stealthily query users, groups and computers and perform attribute writes (e.g., msDs-AllowedToActOnBehalfOfOtherIdentity) to facilitate RBCD attacks.

BOFHound Integration for BloodHound Ingestion:
By toggli...

πŸ€– Agent Actions

Added comprehensive coverage of stealthy Active Directory Web Services (ADWS) enumeration and SoaPy usage:

  1. Created new page:
    src/windows-hardening/active-directory-methodology/adws-enumeration.md
    β€’ Explains ADWS protocol stack, SoaPy features & installation
    β€’ Provides full operational workflow (collection, BOFHound, BloodHound)
    β€’ Includes RBCD write example, detection via ADDS logging & SACL canaries
    β€’ Supplies tooling summary and references section (blog, tools, specs)
    β€’ Follows HackTricks banners/structure guidelines

  2. Updated BloodHound enumeration page:
    src/windows-hardening/active-directory-methodology/bloodhound.md
    β€’ Restored/refreshed content and added reference block linking to the new ADWS page
    β€’ Ensured banners at top/bottom and ...

βœ… Review Checklist

  • Content is technically accurate
  • Formatting follows HackTricks style guidelines
  • Links and references are working
  • Content adds educational value
  • No sensitive information is exposed

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Collaborator Author

πŸ”— Additional Context

Original Blog Post: https://specterops.io/blog/2025/07/25/make-sure-to-use-soapy-an-operators-guide-to-stealthy-ad-collection-using-adws/

Content Categories: Based on the analysis, this content was categorized under "Generic Hacking β†’ Active Directory Web Services (ADWS) Enumeration".

Repository Maintenance:

  • MD Files Formatting: 861 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@carlospolop
Copy link
Collaborator Author

merge

@carlospolop carlospolop merged commit da5a15e into master Jul 28, 2025
@carlospolop carlospolop deleted the update_Make_Sure_to_Use_SOAP_y____An_Operators_Guide_to_S_20250726_012531 branch July 28, 2025 12:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant