Authentication Coercion
Printer Bug (MS-RPRN)
Check if Spooler is running via Remote Registry:
SpoolSample
dementor.py
printerbug.py
PetitPotam (MS-EFSR)
CVE-2021-36942
PetitPotam any host (not only a DC with null sessions allowed for the IPC$ share) without initial creds via proxying through an authenticated session on behalf a DC-relayed machine account:
With Kerberos authentication:
Theory
Mitigation
ShadowCoerce (MS-FSRVP)
EvilentCoerce (MS-EVEN)
WebDAV (WebClient)
Check if callback via WebDAV (HTTP) is possible. It is when the WebClient service is running. If it's possible, then NTLM Relay to LDAPS on behalf of the relayed machine account is your chance for RBCD workstation takeover.
Check via PowerShell:
Check via CME:
Check via GetWebDAVStatus:
Enable WebClient
Put the .searchConnector-ms file on a writable share. When a domain user opens target folder in explorer, the WebClient service should start automatically:
CVE-2022-30216
NTLM Leak
Leak with PowerShell:
Leak with Python:
Leak with rpcping (catch with Responder's DCE-RPC listener):
Leak with a hidden image:
Leak with a shortcut:
Leak with curl:
Tools
Coercer
Last updated