
Here is a short story inspired by that concept. The Silent Port
On the DC, a new scheduled task appeared: \Microsoft\Windows\Update\Orthrus . It would beacon out every 60 minutes over HTTPS, carrying domain credentials harvested from LSASS memory—exfiltrated inside the same allowed HTTP stream. ncacn_http exploit
Her hands flew. She isolated the DC’s HTTP listener port, but it was already too late. The exploit had not crashed the system—it was worse. It was silent. Using a crafted ncacn_http sequence, the attacker had tunneled a SchRpcRegisterTask call directly to the Task Scheduler service. No brute force. No malware dropper. Just a native Windows API call wrapped in an allowed web protocol. Here is a short story inspired by that concept