In your IPv6 AD attack, the line
sudo mitm6 -d GFG.local
is launched before running ntlmrelayx.py -6 …
. What’s the exact role of mitm6 in this chain?
It cracks NTLM hashes passively
It runs a rogue IPv6 DHCP/DNS to hijack name resolution
It upgrades NTLM to Kerberos for ticket reuse
It disables WPAD to avoid proxy loops
This question is part of this quiz :
Cyber Quiz Day 26