Force NTLM Privileged Authentication
Last updated
Last updated
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
is a collection of remote authentication triggers coded in C# using MIDL compiler for avoiding 3rd party dependencies.
If the Print Spooler service is enabled, you can use some already known AD credentials to request to the Domain Controller’s print server an update on new print jobs and just tell it to send the notification to some system. Note when printer send the notification to an arbitrary systems, it needs to authenticate against that system. Therefore, an attacker can make the Print Spooler service authenticate against an arbitrary system, and the service will use the computer account in this authentication.
Using PowerShell, get a list of Windows boxes. Servers are usually priority, so lets focus there:
Using a slightly modified @mysmartlogin's (Vincent Le Toux's) , see if the Spooler Service is listening:
You can also use rpcdump.py on Linux and look for the MS-RPRN Protocol
The PrivExchange
attack is a result of a flaw found in the Exchange Server PushSubscription
feature. This feature allows the Exchange server to be forced by any domain user with a mailbox to authenticate to any client-provided host over HTTP.
By default, the Exchange service runs as SYSTEM and is given excessive privileges (specifically, it has WriteDacl privileges on the domain pre-2019 Cumulative Update). This flaw can be exploited to enable the relaying of information to LDAP and subsequently extract the domain NTDS database. In cases where relaying to LDAP is not possible, this flaw can still be used to relay and authenticate to other hosts within the domain. The successful exploitation of this attack grants immediate access to the Domain Admin with any authenticated domain user account.
If you are already inside the Windows machine you can force Windows to connect to a server using privileged accounts with:
It's possible to use certutil.exe lolbin (Microsoft-signed binary) to coerce NTLM authentication:
If you know the email address of the user that logs inside a machine you want to compromise, you could just send him an email with a 1x1 image such as
and when he opens it, he will try to authenticate.
If you can perform a MitM attack to a computer and inject HTML in a page he will visualize you could try injecting an image like the following in the page:
You can compile.
or use or if you're on Linux
If an attacker has already compromised a computer with , the attacker could make the printer authenticate against this computer. Due to the unconstrained delegation, the TGT of the computer account of the printer will be saved in the memory of the computer with unconstrained delegation. As the attacker has already compromised this host, he will be able to retrieve this ticket and abuse it ().
Or use this other technique:
If you can capture . Remember that in order to crack NTLMv1 you need to set Responder challenge to "1122334455667788"
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
Check the !
Join the 💬 or the or follow us on Twitter 🐦 .
Share hacking tricks by submitting PRs to the and github repos.