Ncacn_http Exploit Now
On the DC, a new scheduled task appeared: \Microsoft\Windows\Update\Orthrus . It would beacon out every 60 minutes over HTTPS, carrying domain credentials harvested from LSASS memory—exfiltrated inside the same allowed HTTP stream.
It wasn't the payload that bothered her. It was the protocol . ncacn_http exploit
Her coffee went cold.
As she initiated a full tier-zero credential rotation, she watched the attacker’s last packet. It was a clean RPC_BIND_ACK —polite, almost. The digital equivalent of a thief tipping his hat before walking out the door. On the DC, a new scheduled task appeared: