AD - Initial Attack Vectors

โžก๏ธ LLMNR (Link-Local Multicast Name Resolution) protocol (NetBIOS / NBT-NS successor) allows hosts to perform name resolution for hosts on the same local network without requiring a DNS server.

  • When a host DNS query fails -> the host broadcast an LLMNR query across the local network

    • An attacker can listen for these queries and respond to them with its IP to redirect traffic, leading to relay attacks and credentials theft (username & NTLM hash)

LLMNR Posoning - tcm-sec.com

Responder

โžก๏ธ Responder - LMNR, NBT-NS and MDNS poisoner

  • HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server

  • Supports NTLMv1/NTLMv2/LMv2 with Extended Security NTLMSSP

  • Built-in HTTP and HTTPS auth servers

  • Built-in MSSQL auth server

  • ... more ...

  • Login to THEPUNISHER VM with fcastle user and try to open WinExplorer and navigate to \\192.168.31.131 (Kali IP)

  • An event occurs and triggers LLMNR

    • victim's username and password NTLMv2 hash received

NTLMv2 Crack

  • Save the hash into a hashes.txt file and try to crack it

Cracked password

โžก๏ธ SMB (Server Message Block) is a network file sharing protocol. Common in Windows, it allows shared access to files and printers. However, when unsecured and paired with NTLM authentication, it becomes a target to relay attacks.

  • Attackers intercept and relay SMB authentication attempts to another server, impersonating the user and exploiting SMB due to lack of SMB signing, gaining unauthorized access

  • Requirements:

    • SMB signing disabled or not enforced

    • Relayed user must have local admin credentials

    • Credentials cannot be relayed to the same machine

Identify the hosts without SMB signing.

  • SMB signing is not enforced (default setting for Windows workstations)

  • Create a targets.txt file with the gathered targets

  • Setup Responder configuration file

ntlmrelayx.py

โžก๏ธ ntlmrelayx.py - This module performs the SMB Relay attacks to many target protocols (SMB, MSSQL, LDAP, etc).

  • Setup the NTLM relay

  • (ntlmrelayx.py is older version installed via PimpMyKali)

  • Login to THEPUNISHER VM with fcastle user and try to open WinExplorer and navigate to \\192.168.31.131 (Kali IP)

  • An event occurs and triggers LLMNR, is captured by responder, passed to ntlmrelayx with relays the credentials to the targets in our targets.txt file

  • The local SAM hashes are dumped from SPIDERMAN and automatically saved into the 192.168.31.92_samhashes.sam file

  • Try to start an interactive shell via ntlmrelayx.py

msfconsole - shell access

psexec.py - shell access

โžก๏ธ psexec.py


IPv6 DNS Takeover

mitm6

โžก๏ธ mitm6 - exploits the default Windows config to take over the default DNS server by replying to DHCPv6 messages, providing the victim with a link-local IPv6 address and setting the attacker's host as default DNS server

  • Setup the relay attack

  • Reboot THEPUNISHER VM and check the ntlmrelayx.py output

  • Go to ~/tcm/peh/ad-attacks/lootme directory

    • the files contain data about domain users, computers, groups, policies, etc

  • Login to THEPUNISHER using the MARVEL\administrator and check the successful attack

    • User bkVKFfXduD has been created

Mitigation

Mitigate IPv6 poisoning:

  • Block DHCPv6 traffic and router advertisements in Windows Firewall using Group Policy

  • Use specific rules:

    • (Inbound) Core Networking - DHCPv6-In

    • (Inbound) Core Networking - ICMPv6-In

    • (Outbound) Core Networking - DHCPv6-Out

Disable WPAD if not in use:

  • Use Group Policy and disable WinHttpAutoProxySvc service

Mitigate LDAP/LDAPS relaying:

  • Enable both LDAP signing and LDAP channel binding

Protect administrative accounts:

  • Consider marking accounts as sensitive or adding them to the Protected Users group to prevent delegation and impersonation


Pass-Back Attack

Check this article for more information about the attack - How to Hack Through a Pass-Back Attack: MFP Hacking Guide

  • MFPs (Multi-Function Peripherals - printers, copiers) are often overlooked targets but can be exploited for serious security breaches

  • Pass-Back Attack - involves redirecting MFP's LDAP authentication to a malicious server to capture user credentials

  • Tools like PRET can be used to access MFP settings.

  • High-risk, low-effort - exploiting MFPs can yield sensitive data with minimal effort.

https://www.hacking-printers.net/wiki/index.php/Printer_Security_Testing_Cheat_Sheet

Last updated

Was this helpful?