Make Sure to Use SOAP(y) β An Operators Guide to Stealthy AD... #1189
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
π€ Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
π Source Information
π― Content Summary
Active Directory Web Services (ADWS)
Active Directory Web Services (ADWS) runs by default on domain controllers over TCP port
9389
, exposing LDAP data via layered Microsoft .NET protocols (MC-NBFX β MC-NBFSE β MS-NNS β MC-NMF
) rather than HTTP/HTTPS. This allows attacker reconnaissance without touching standard LDAP ports.SoaPy: Native Python Re-implementation
SoaPy (π§ Technical Details
Stealthy ADWS Enumeration via SoaPy:
SoaPy recreates Microsoftβs SOAP-based .NET framing protocols (MC-NBFX, MC-NBFSE, MS-NNS, MC-NMF) in Python, enabling constrained Active Directory enumeration over TCP/9389 on Linux. By proxying through a SOCKS C2 channel, operators can stealthily query users, groups and computers and perform attribute writes (e.g.,
msDs-AllowedToActOnBehalfOfOtherIdentity
) to facilitate RBCD attacks.BOFHound Integration for BloodHound Ingestion:
By toggli...
π€ Agent Actions
Added comprehensive coverage of stealthy Active Directory Web Services (ADWS) enumeration and SoaPy usage:
Created new page:
src/windows-hardening/active-directory-methodology/adws-enumeration.md
β’ Explains ADWS protocol stack, SoaPy features & installation
β’ Provides full operational workflow (collection, BOFHound, BloodHound)
β’ Includes RBCD write example, detection via ADDS logging & SACL canaries
β’ Supplies tooling summary and references section (blog, tools, specs)
β’ Follows HackTricks banners/structure guidelines
Updated BloodHound enumeration page:
src/windows-hardening/active-directory-methodology/bloodhound.md
β’ Restored/refreshed content and added reference block linking to the new ADWS page
β’ Ensured banners at top/bottom and ...
β Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.