본문 바로가기

Ncacn_http Exploit May 2026

Her hands flew. She isolated the DC’s HTTP listener port, but it was already too late. The exploit had not crashed the system—it was worse. It was silent. Using a crafted ncacn_http sequence, the attacker had tunneled a SchRpcRegisterTask call directly to the Task Scheduler service. No brute force. No malware dropper. Just a native Windows API call wrapped in an allowed web protocol.

Here is a short story inspired by that concept. The Silent Port ncacn_http exploit

On the DC, a new scheduled task appeared: \Microsoft\Windows\Update\Orthrus . It would beacon out every 60 minutes over HTTPS, carrying domain credentials harvested from LSASS memory—exfiltrated inside the same allowed HTTP stream. Her hands flew