Authentication Coercion

It's a good idea to check if NTLMv1 downgrade is possible when triggering the callbacks.

NTLMv1 Downgrade

Printer Bug (MS-RPRN)

Check if Spooler is running via Remote Registry:

SpoolSample

dementor.py

printerbug.py

PetitPotam (MS-EFSR)

CVE-2021-36942

PetitPotam any host (not only a DC with null sessions allowed for the IPC$ share) without initial creds via proxying through an authenticated session on behalf a DC-relayed machine account:

NTLM Relay DC1 to EXCH1 to get SOCKS ➡️ SOCKS proxy PetitPotam to EX1 as DC1$ ➡️ NTLM Relay to EXCH2 to dump hashes

With Kerberos authentication:

Theory

Mitigation

ShadowCoerce (MS-FSRVP)

EvilentCoerce (MS-EVEN)

WebDAV (WebClient)

Check if callback via WebDAV (HTTP) is possible. It is when the WebClient service is running. If it's possible, then NTLM Relay to LDAPS on behalf of the relayed machine account is your chance for RBCD workstation takeover.

Check via PowerShell:

Check via CME:

Check via GetWebDAVStatus:

Enable WebClient

Put the .searchConnector-ms file on a writable share. When a domain user opens target folder in explorer, the WebClient service should start automatically:

CVE-2022-30216

NTLM Leak

Leak with PowerShell:

Leak with Python:

Leak with rpcping (catch with Responder's DCE-RPC listener):

Leak with a hidden image:

Leak with a shortcut:

Leak with curl:

Tools

Coercer

Last updated