🛠️ Step 1: Initial Network Poisoning & Traffic Capture
- Start with
mitm6
or Responder
to intercept authentication traffic. (Early in the morning/After lunch)
- Use
ntlmrelayx
to relay captured credentials if possible.
- Monitor for IPv6 fallback attacks in case IPv4 is prioritized.
🔍 Step 2: Network & Host Enumeration
- Run network scans (
nmap
, crackmapexec
) to generate and capture traffic.
- If scans take too long, focus on low-noise recon (e.g.,
http_version
, smbmap
).
- Identify open shares (
smbclient
, net view
).
- Check Group Policy Preferences (GPP) for stored credentials.
- Query LDAP for user and machine accounts (
ldapsearch
, bloodhound
).
🔑 Step 3: Exploiting Web-Based Targets
- Look for default credentials in:
- Printers (
hp
, ricoh
, canon
, sharp
)
- Jenkins, Tomcat, Webmin, Splunk, etc.
- SharePoint, Confluence, GitLab
- Try password spraying on portals with common passwords.
- Identify exposed API endpoints for unauthenticated access.
📌 Step 4: Lateral Movement & Privilege Escalation
- Use captured NTLM hashes to relay (
ntlmrelayx
, smbexec
).
- Attempt Pass-Back Attacks on trusted devices.