Coercer NTLM Forced Authentication

preview_player
Показать описание
If you are still using multiple attack tools like Petitpotom, Printerbug, ShadowCoerce, or DFSCoerce to coerce authentication to Responder, then you are wasting time. Just use Coercer to try many different methods of forced authentication all at once. Watch my DC cry NTLM tears.

Coercer:

-~-~~-~~~-~~-~-
Please watch: "Red Team Tips February 1st: OPSEC Safe Active Directory Enumeration with SilentHound "
-~-~~-~~~-~~-~-
Рекомендации по теме
Комментарии
Автор

just a quick question.. Are credentials required for this? What if we don't find password by spraying? Whould username be enough to launch and grab hashes ?

cybersecurehacks
Автор

Awesome. These new tools are great.

Can this be done without the password, say if you have an id_rsa key and you know the password phrase to the id_rsa key?

Noflexing
Автор

Thanks for showing how easy it is to use Coercer. Outside of patching, do you have any recommendations for mitigating this attack?

mauriceandrewsjr
Автор

Great video. Do you have any easy way to know if NTLM is enabled on the network? Thanks

DavidKennedy-
Автор

Since these are NetNTLM Hashes we can't use the for authentication. Is the next step ntlmrelayx to get Hashes from other domain clients? Machine passwords are usually complex and hard to crack, right?

Ltbnary
Автор

Great video, I wish you could've kept going and discussed what's so bad about this misconfiguration, and talked about why its so bad. Could you answer these questions that popped up in my head? What would next steps be regarding getting on the Domain Controller? You have the NTLMv2 hash but you can't pass that hash to the DC you can only pass NTLM hashes.

allenh-tetm
Автор

This its so interesting if u combine with ntlmrelayx, try it, its very cool and powerfull

Delexjarkol