Authentication Coercion
It's a good idea to check if NTLMv1 downgrade is possible when triggering the callbacks.
Printer Bug (MS-RPRN)
Check if Spooler is running via Remote Registry:
SpoolSample
dementor.py
printerbug.py
PetitPotam (MS-EFSR)
CVE-2021-36942
PetitPotam any host (not only a DC with null sessions allowed for the IPC$ share) without initial creds via proxying through an authenticated session on behalf a DC-relayed machine account:
NTLM Relay DC1 to EXCH1 to get SOCKS ➡️ SOCKS proxy PetitPotam to EX1 as DC1$ ➡️ NTLM Relay to EXCH2 to dump hashes
With Kerberos authentication:
Theory
Mitigation
ShadowCoerce (MS-FSRVP)
EvilentCoerce (MS-EVEN)
WebDAV (WebClient)
Check if callback via WebDAV (HTTP) is possible. It is when the WebClient service is running. If it's possible, then NTLM Relay to LDAPS on behalf of the relayed machine account is your chance for RBCD workstation takeover.
Check via PowerShell:
Check via CME:
Check via GetWebDAVStatus:
Enable WebClient
Put the .searchConnector-ms file on a writable share. When a domain user opens target folder in explorer, the WebClient service should start automatically:
CVE-2022-30216
NTLM Leak
Leak with PowerShell:
Leak with Python:
Leak with rpcping (catch with Responder's DCE-RPC listener):
Leak with a hidden image:
Leak with a shortcut:
Leak with curl:
Tools
Coercer
Last updated