Authentication Coercion

circle-info

It's a good idea to check if NTLMv1 downgrade is possible when triggering the callbacks.

NTLMv1 Downgradechevron-right

Printer Bug (MS-RPRN)

Check if Spooler is running via Remote Registry:

SpoolSample

dementor.py

printerbug.py

PetitPotam (MS-EFSR)

CVE-2021-36942

PetitPotam any host (not only a DC with null sessions allowed for the IPC$ share) without initial creds via proxying through an authenticated session on behalf a DC-relayed machine account:

circle-info

NTLM Relay DC1 to EXCH1 to get SOCKS ➡️ SOCKS proxy PetitPotam to EX1 as DC1$ ➡️ NTLM Relay to EXCH2 to dump hashes

With Kerberos authentication:

Theory

Mitigation

ShadowCoerce (MS-FSRVP)

EvilentCoerce (MS-EVEN)

WebDAV (WebClient)

Check if callback via WebDAV (HTTP) is possible. It is when the WebClient service is running. If it's possible, then NTLM Relay to LDAPSarrow-up-right on behalf of the relayed machine account is your chance for RBCD workstation takeoverarrow-up-right.

Check via PowerShell:

Check via CME:

Check via GetWebDAVStatusarrow-up-right:

Enable WebClient

Put the .searchConnector-ms file on a writable share. When a domain user opens target folder in explorer, the WebClient service should start automatically:

CVE-2022-30216

NTLM Leak

Leak with PowerShell:

Leak with Pythonarrow-up-right:

Leak with rpcping (catch with Responder's DCE-RPC listener):

Leak with a hidden image:

Leak with a shortcut:

Leak with curl:

Tools

Coercer

Last updated