Network Attacks

ko-fi

Network Recon

Host Discovery
bash find_cidrs.sh eth0

Dismap

NetScan - From Windows Host

Sniffing

Wireshark or tcpdump - Credentials in clear text ?

Miscellaneous TechniquesInteracting with Users

Extract NTLMv1, etc

Extract NTLMv2

NFS Data Extraction

Finding vulnerabilities - Above

Above is an invisible network sniffer for finding vulnerabilities in network equipment. It is based entirely on network traffic analysis, so it does not make any noise in the air. He’s invisible.

Convert pcapng to pcap

Open outbound ports / Filtering

Web content filtering

For example, try to connect to 4chan or exploit-db with CLI but also with a browser

Living Off Trusted Sites

Try to access some of LOTS

Port Filtering

Test for other ports: 22, 21, 23, etc.

Protocol Filtering

For example, if port 22 is blocked, also test for protocol filtering: SSH on port 443 ?

Server side:

Try to connect over port 443

The Protocol Filter feature is used to block unwanted traffic from your network. The feature is commonly used to make sure employees, students or end users are using their Internet access for its intended productive use. The filter can block dozens of different protocols, including: peer-to-peer traffic (Source: ClearOS)

ARP - DNS Spoofing

Bettercap

Standalone version:

Arpspoof

Eavesarp

Detect and exploit Stale Network Address Configurations (SNACs) via network traffic analysis and ARP poisoning techniques

LLMNR NBT-NS Poisoning

LLMNR NBT-NS Poisoning

ADIDNS Spoofing

ADIDNS Spoofing

MITM6

MITM MySQL

Use CredSLayer to extract salts and password hash

MITM - ASReproast

Misconfiguration

MITM - Kerberoast

Kerberoast

No LDAP Signing - KrbRelayUp

No-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).

KrbRelay

  • Cross-session attack:

    • KrbRelay.exe -s <SESSION-ID> -clsid 354FF91B-5E49-4BDC-A8E6-1CB6C6877182 -ntlm

  • Read out local SAM database hashes:

    • KrbRelay.exe -cslid F8842F8E-DAFE-4B37-9D38-4E0714A61149 -session <TARGET-SESSION-ID> -spn cifs/<TARGET-SYSTEM>.<DOMAIN> -secrets

  • Relaying Kerberos to SMB for remote access:

    • KrbRelay.exe -cslid f8842f8e-dafe-4b37-9d38-4e0714a61149 -session <SESSION-ID> -spn cifs/<TARGET-SYSTEM>.<DOMAIN> -console

NTLM Relay

SMB (445, 139) / RPCAD CS

Kerberos Relay

Over HTTP

Over SMB

SMB (445, 139) / RPCAD CS

Via DHCPv6-DNS-Takeover

Last updated