1. Getting Foothold

Brute Forcing NetNTLM

Internet facing applications may have their authentication tied back to an AD. If we manage to brute force these credentials, we may have access to the server

LDAP Passback attack

If we have access to a page with LDAP configurations and password censored out, we can setup our own LDAP server to intercept the traffic and obtain the password

Create a olcSaslSecProps.ldif file

Patch the existing LDAP file with the created file

Run TCPdump and click Test Settings to send the request

SMB Auth Relay

Use Responderto intercept NTLM authentication traffic.

After we get the NTLM hash, we can either

  1. Crack the hash

  2. Relay the hash and MITM the process of getting a TGS. For this to happen, SMB signing needs be disabled, or enabled but not enforced.

Microsoft Development Toolkit

Extracting credentials preloaded in the PXE boot image

Downloading the BCD file from the MDT site

Getting the location of the wim file

Download the WIM file and extract credentials

Configuration files

If we already have access to the host machine, search for artifacts that may contain credentials

  • Configuration files

  • Data stores

  • Password stores

Last updated