githubEdit

IPv6 DNS Takeover

Essentially, we become Man-in-the-Middle using IPv6

Tools: mitm6, ntlmrelayx

DNS Poisoning - Relay delegation with mitm6

Tool: https://github.com/dirkjanm/mitm6

Requirements

1) IPv6 enabled (Windows prefers IPV6 over IPv4)

2) LDAP over TLS (LDAPS)

(Python tool) Spoof DHCPv6 responses to provide evil DNS config. Usefull to combine with NTLM or Kerberos Relay attacks. Here for an NTLM relay:

mitm6 -i interface_to_use -d domain.local -hw target.domain.local -v

Here for a Kerberos relay to ADCS:

mitm6 -i interface_to_use -d domain.local -hw target.domain.local --relay CA.domain.local -v

ntlmrelayx relays the captured credentials to LDAP on the domain controller, uses that to create a new machine account, print the account's name and password and modifies the delegation rights of it.

Steps

Now granting delegation rights and then do a RBCD

Steps:

1)

2)

3) Enjoy your loot! (Enumerates EVERYTHING that tries to authenticate against the target)

Last updated