IPv6 Attacks
Last updated
Was this helpful?
Last updated
Was this helpful?
Firstly I setup MITM6 in Kali machine: mitm6 -d marvel.local
Once MITM6 was setup, I setup NTLMRelayx: ntlmrelayx.py -6 -t ldaps://192.168.64.151 -wh wpad.marvel.local -l lootme
In the above command, -6 refers to IPv6, the IP address is of DC, -wh value is gained from the output of mitm6, -l creates a lootme directory with various loots.
Once the two commands were running, I restarted the Frank Castle machine and logged in as the Frank Castle user. Upon doing this, it dumped the loot in the lootme directory.
Then I logged in with MARVEL\Administrator user in the Frank Castle machine. This time, ntlmrelay created a new user for me.
The user gets created. It is a Domain User with special ACL permissions assigned to it.
There are several other attacks that can be performed: