Credentialess Attacks on Active Directory
Credentialess Attacks on Active Directory
ma
Do
he
t
ing
Pwn
Credentialess
/
Username
HADESS WWW.HADESS.IO
Introduction
In the ever-evolving landscape of cybersecurity, understanding and mitigating potential threats
to Active Directory domains is paramount for safeguarding sensitive organizational data. In this
chapter of our ongoing series, "Pwning the Domain," we delve into the realm of credentialess
and username-based attacks, exploring the techniques and vulnerabilities that adversaries
exploit to compromise domain security. Through meticulous reconnaissance efforts, attackers
leverage various reconnaissance techniques to gather crucial information about the target
environment. Techniques such as DHCP fingerprinting, DNS enumeration, NBT-NS queries, LDAP
enumeration, RPC enumeration, and SMB null sessions provide adversaries with a
comprehensive understanding of the network topology and potential entry points.
Moreover, attackers meticulously probe for usernames within the domain infrastructure,
understanding that user accounts serve as gateways to accessing valuable resources. Through
methods like SMB enumeration, RPC enumeration, LDAP queries, and Kerberos reconnaissance,
adversaries identify valid usernames within the domain ecosystem, laying the groundwork for
further exploitation. Armed with this intelligence, attackers pivot towards leveraging man-in-
the-middle (MiTM) attacks to intercept and manipulate network traffic, exploiting vulnerabilities
in protocols like LLMNR, NBT-NS, mDNS, ARP, DNS, DHCP, and WSUS to intercept
authentication credentials and escalate privileges.
Moreover, this chapter delves into the realm of brute-force attacks, where adversaries leverage
password spraying and pre-authentication techniques to systematically guess or test passwords
against a large number of user accounts, exploiting weak or default credentials to gain
unauthorized access.
Lastly, we explore various vulnerabilities that threaten the security of Active Directory domains,
including Proxyshell, Proxylogon, Eternalblue, SMBGhost, Zerologon (unauthenticated version),
and Petitpotam (unauthenticated version). Understanding and mitigating these vulnerabilities
are critical for organizations to defend against sophisticated cyber threats and protect their
valuable assets from compromise. Through this comprehensive exploration, we aim to equip
security practitioners with the knowledge and tools necessary to bolster the resilience of their
domain infrastructure and mitigate the risk of unauthorized access and data breaches.
To be the vanguard of cybersecurity, Hadess envisions a world where digital assets are safeguarded from malicious actors. We strive to create a secure digital ecosystem, where
businesses and individuals can thrive with confidence, knowing that their data is protected. Through relentless innovation and unwavering dedication, we aim to establish Hadess as a
symbol of trust, resilience, and retribution in the fight against cyber threats.
Document info
HADESS
To be the vanguard of cybersecurity, Hadess envisions a world where digital assets are
safeguarded from malicious actors. We strive to create a secure digital ecosystem, where
businesses and individuals can thrive with confidence, knowing that their data is protected.
Through relentless innovation and unwavering dedication, we aim to establish Hadess as a
symbol of trust, resilience, and retribution in the fight against cyber threats.
At Hadess, our mission is twofold: to unleash the power of white hat hacking in punishing black
hat hackers and to fortify the digital defenses of our clients. We are committed to employing our
elite team of expert cybersecurity professionals to identify, neutralize, and bring to justice those
who seek to exploit vulnerabilities. Simultaneously, we provide comprehensive solutions and
services to protect our client's digital assets, ensuring their resilience against cyber attacks. With
an unwavering focus on integrity, innovation, and client satisfaction, we strive to be the guardian
of trust and security in the digital realm.
Security Researcher
Amir Gholizadeh (@arimaqz), Surya Dev Singh (@kryolite_secure)
Table of Content
- Reconnaissance
- DHCP
- DNS
- NBT-NS
- LDAP
- RPC
- Finding usernames
- SMB
- RPC
- LDAP
- Kerberos
- MiTM
- LLMNR/NBT-NS/mDNS
- ARP
- DNS
- DHCP
- WSUS
- ASREQRoasting
- NetNTLM relay
- SMB
- MSSQL
- ASREPRoasting
- Bruteforcing
- Password spraying
- Pre-authentication
- Vulnerabilities
- Proxyshell
- Proxylogon
- Eternalblue
- SMBGhost
- Zerologon(unauthenticated version)
- Petitpotam(unauthenticated version)
Pwning the Domain: Credentialess/Username
HADESS.IO
Executive Summary
1. Reconnaissance Techniques: 6. Brute-Force Attacks:
Reconnaissance is the initial phase of an attack where Brute-force attacks involve systematically guessing or
adversaries gather intelligence about the target testing passwords against a large number of user
environment. Techniques such as DHCP accounts. Techniques such as password spraying and
fingerprinting, DNS enumeration, NBT-NS queries, and pre-authentication attacks target weak or default
SMB null sessions provide insight into the network credentials to gain unauthorized access to domain
topology and potential vulnerabilities. Additionally, resources.
LDAP enumeration and RPC enumeration allow 7. Vulnerability Exploitation:
attackers to gather detailed information about Active Various vulnerabilities, including Proxyshell,
Directory objects and services. Proxylogon, Eternalblue, SMBGhost, Zerologon
2. User Enumeration: (unauthenticated version), and Petitpotam
Adversaries leverage various protocols including SMB, (unauthenticated version), pose significant threats to
RPC, LDAP, and Kerberos to enumerate valid Active Directory security. Exploiting these
usernames within the domain infrastructure. This vulnerabilities can lead to unauthorized access,
reconnaissance phase lays the foundation for privilege escalation, and data breaches, highlighting
subsequent attacks by identifying potential targets for the importance of timely patching and mitigation
credential-based exploitation. efforts.
3. Man-in-the-Middle Attacks:
Man-in-the-middle (MiTM) attacks exploit
vulnerabilities in protocols like LLMNR, NBT-NS,
mDNS, ARP, DNS, DHCP, and WSUS to intercept and
manipulate network traffic. These attacks can lead to
credential theft, privilege escalation, and
unauthorized access to sensitive data.
4. NetNTLM Relay:
NetNTLM relay attacks involve intercepting
authentication requests sent over SMB and MSSQL
protocols, allowing attackers to relay these requests
to gain unauthorized access to systems and resources
within the domain.
5. ASREPRoasting:
ASREPRoasting is a technique used to target weak or
misconfigured user accounts in Active Directory.
Attackers exploit vulnerabilities in the Kerberos
protocol to extract hash credentials, which can be
cracked offline to gain unauthorized access.
6.
Key Findings
The key findings from this overview of reconnaissance techniques and attack vectors targeting Active Directory domains
reveal the comprehensive strategies employed by adversaries to gather intelligence, enumerate user accounts, execute
man-in-the-middle attacks, exploit authentication relay vulnerabilities, perform ASREPRoasting, launch brute-force
attacks, and exploit critical vulnerabilities like Proxyshell, Proxylogon, Eternalblue, SMBGhost, Zerologon (unauthenticated
version), and Petitpotam (unauthenticated version). These findings underscore the critical importance of implementing
robust security measures, including patching vulnerabilities, securing authentication protocols, and monitoring network
traffic to defend against potential threats and mitigate the risk of unauthorized access, privilege escalation, and data
breaches within Active Directory environments.
Pwning the Domain: Credentialess/Username
Abstract
The "Pwning the Domain: Credentialess/Username" article explores a range of sophisticated attack
techniques targeting Active Directory environments, focusing on methods that require little to no
credentials for initial access. Beginning with reconnaissance, adversaries leverage DHCP, DNS, NBT-NS,
LDAP, RPC, and SMB null sessions to gather crucial intelligence about network topology and potential
vulnerabilities.
Subsequently, attackers utilize SMB, RPC, LDAP, and Kerberos protocols to enumerate valid usernames
within the domain infrastructure, laying the groundwork for credential-based exploitation. Additionally, the
article delves into man-in-the-middle (MiTM) attacks, including LLMNR/NBT-NS/mDNS poisoning, ARP
spoofing, and ASREQRoasting, which allow adversaries to intercept and manipulate network traffic,
potentially leading to credential theft and unauthorized access.
Furthermore, the article explores techniques such as NetNTLM relay, ASREPRoasting, and brute-force
attacks, providing insights into how adversaries exploit authentication mechanisms and weak passwords to
compromise domain security. Lastly, the article addresses critical vulnerabilities like Proxyshell,
Proxylogon, Eternalblue, SMBGhost, Zerologon (unauthenticated version), and Petitpotam
(unauthenticated version), emphasizing the importance of timely patching and mitigation efforts to defend
against potential exploits and safeguard Active Directory environments.
Through a comprehensive examination of these attack vectors, the article aims to equip security
practitioners with the knowledge and tools necessary to bolster the resilience of their domain
infrastructure and mitigate the risk of unauthorized access and data breaches.
HADESS.IO
HADESS.IO
Credentialess/Username
01
Attacks
HADESS.IO Pwning the Domain: Credentialess/Username
Reconnaissance
Reconnaissance is an important step when engaging in a red teaming/penetration testing assessment. It may provide you
the information you need later on while it may not seem so important in the meantime, For example you may stumble
upon a username which you can make use of when brute forcing or using it in an ASREPRoast attack.
DHCP
DHCP(Dynamic Host Configuration Protocol) is a protocol that we can use in networks to dynamically assign IP addresses
to hosts. DHCP has four steps till finally assigning an IP address the second step being “DHCP offer”. It is sent after a client
sends a “DHCP discover” packet to find DHCP servers and request IP addresses from them. DHCP offer packet contains a
lot information which can be of use to us:
Name servers
Domain names
Name servers and domain names can be set by DHCP hence the information.
To retrieve this information you can either sniff it in wireshark or use a nmap script:
nmap --script broadcast-dhcp-discover
DNS
AD DS relies on DNS SRV RR which stands for Service Location Resource records to find LDAP/KDC/global catalog/..
Servers. Using nslookup we can query these records:
LDAP: nslookup -type=srv _ldap._tcp.dc._msdcs.<domain name>
KDC: nslookup -type=srv _kerberos._tcp.<domain name>
Global catalog: nslookup -type=srv _ldap._tcp.<domain name>
NBT-NS
Like DNS, NBT-NS is also used to translate names to IP addresses. It’s used as a fallback by default when DNS is not
working.
Get names: nbtscan -r <net id>/<mask>
Get the name for a single IP: nmblookup -A <IP>
Responder is a tool red teamers often use specially at the start of the assessment. We cannot explain it any better than
the author itself: “Responder is an LLMNR, NBT-NS and MDNS poisoner.”
Responder has a mode called ‘analyze mode’ which some may not be familiar with, in analyze mode it looks passively for
the below information:
DC
SQL server
Workstation
FQDNs
Windows versions
..
To use this mode:
responder -I "<net interface>" -A
HADESS.IO Pwning the Domain: Credentialess/Username
LDAP
LDAP is a protocol used within the AD realm to talk to directory services and exchange information. Many information can
be obtained by leveraging LDAP:
Users
Machines
Groups
GPOs
..
To enumerate using LDAP you can use ldapsearch or similar tools. Do note that when you have no credentials, anonymous
binding must be enabled to query it or else you’ll see the error “bind must be completed”.
A basic query: ldapsearch -x -h <ip> -s base
RPC
Many things within windows talk to each other using RPC. RPC is a protocol which enables a program to request a service
from another program on another system or even locally also known as inter-process communication. To talk to RPC
when you have no credential, you must have null session enabled in a SMB server to talk to RPC using SMB named pipes.
From there you can enumerate:
Users
Groups
Policies
..
For interacting with RPC you can use a tool called rpcclient. To use it in unauthenticated mode:
rpcclient -U “” -N <ip>
To query:
Users : enumdomusers
User details: queryuser <rid>
Groups: enumdomgroups
Group details: querygroup <rid>
Domains: enum
All available shares: netshareenumall
Finding usernames
Finding usernames is a crucial step in red team assessment which opens the way for more attack vectors.
SMB
When you have a victim SMB server with null session enabled, it can be used to find users using Impacket’s lookupsid
which bruteforces SIDs.
RPC
If you have access to a SMB server with null session enabled, you can talk to RPC and enumerate users from it using
rpcclient and the command enomdumusers and get a specific user’s details using queryuser <rid> as explained above.
HADESS.IO Pwning the Domain: Credentialess/Username
LDAP
LDAP can also be used to find usernames with the same command as specified above in reconnaissance step: ldapsearch
-x -h <ip> -s base
Kerberos
Kerberos is the three-headed dog guardian of the Windows realm. The pre-authentication step when authentication users
to AD can be used to also bruteforce and enumerate users. The tool that can be used for this is kerbrute.
kerbrute userenum -d <domain name> usernames.txt
Man in the middle attack is always the worthy attack to try if we want to PWN the domain controller. There are several
protocol and windows mechanism that we can target to perform these attack. we will look at each of these.
NBT-NS : NetBIOS name service (NBT-NS) is a Windows protocol that is used to translate NetBIOS names to IP addresses
on a local network. It works on UDP 137 and is predecessor of LLMNR.
MDNS : Multicast DNS also help in name resolution . unlike NBT-NS it doesn't query name server, instead I sends multicast
packet to all the client in the network , so when a connection between sender and recipient is made, all participants are
informed of the connection between the name and IP and can make corresponding entry in MDNS cache.
Let's say a Victim wants to connect to a SMB share on the network drive called \\Hadess if that share doesn't exits the the
Network server will replies that he can't connect to you to \\Hadess . so now the victim which is trying to connect to share,
will send a multicast request to entire networking using LLMNR asking if any user knows the route address to that
particular drive.
Now adversary can take advantage of that and can send rouge replies to above multicast request that they know the
identity of the shared drive \\Hadess but in turn victim have to return the NTLM hash. This means that attacker can
poisoning the network with fake address but still get the NTLM hash of the victim.
HADESS.IO Pwning the Domain: Credentialess/Username
responder -I eth0
This will enable The LLMNR and will respond to LLMNR requests. if any user by mistake tries to access the drive or share
that are not available , can lead to exfiltration of NTLM packages.
HADESS.IO Pwning the Domain: Credentialess/Username
This would Essentially provide us with NTLM hashes of victim , which we can crack it with help of Hashcat or can follow up
for Pass the Hash attacks.
In the ARP spoofing attack , the attacker can intercept the communication between network devices.
The network must be accessible to the attacker. They search the network for the IP addresses of a minimum of two
devices, assuming these are a router and a workstation. Here is the output of ARP table before the attack.
arp -a
HADESS.IO Pwning the Domain: Credentialess/Username
The attacker sends out fake ARP answers by using a spoofing tool like Arpspoof or bettercap. It is conducted by opening
two terminal in kali and send the command like so :
The falsified answers claim that the attacker's MAC address is the correct MAC address for both IP addresses, which
belong to the workstation and router. By doing this, the workstation and router are tricked into connecting to the
attacker's computer rather than to one another.
From so on, rather of speaking with each other directly, the two devices communicate with the attacker by updating their
entries in the ARP cache.
Now, the attacker is surreptitiously interfering with every conversation. we can check it via ARP table again :
So , If the data is not being encrypted or the protocol is not using SSL/TLS and authentication attempt is made it can
provide the access to sensitive data or NTLM hashes , which can latter be crack to
provide access to DC. Attacker can see the data packets flowing out of his computer in wireshark.
Also an attacker need to forward the incoming packets out form his computer , it can be done like so :
Since we had done ARP spoofing via arpspoof we can also utilize the Bettercap or Ettercap to do the same With help of
these commands , I will use Bettercap to demonstrate that.
net.probe on
arp.spoof on
net.sniff on
These command will start ARP spoof and will capture the data traffics. But Now since we want to conduct DNS Spoofing /
Hijacking, we will follow up more like this :
set dns.spoof.domains [domains separated by commas here] set dns.spoof.address [IP address where traffic will
go]
dns.spoof on
We can also use the file for which specific domain should undergo DNS spoofing or if we wanted to spoof all DNS request.
Windows machines provide several Custom DHCP flags like NetBIOS, WINS, WPAD settings. When a workstation sends a
DHCP request to get its networking settings, these additional settings can be included in the DHCP answer to facilitate
straightforward connectivity and name resolution.
From the above Described flags, the DHCP options 252 Provides a way to send out WPAD configuration out to client who
is requesting network setting. If An attacker able to answer broadcast DHCP queries faster than the legit DHCP server can
inject any WPAD network setting on the requesting client. WPAD is just like a proxy setting given so that , if any request
client is making out it first passes through that proxy.
First attacker need to reply to DHCP request faster than legit DHCP server , this can be achieve via DHCP starvation
attack.
Now , the rouge DHCP Server of the attacker sends out ACK response to request with malicious WPAD network setting for
a very short lease time (eg: 30 secs)
Now Wait for the lease to get expired and it it ask the new lease from the legit DHCP server only.
The Injected WPAD network setting will be there in client memory until it reboots.
Now the infected client will try to get wpad.dat file from the malicious rouge WPAD server to get the proxy address
Now our malicious rouge WPAD server will force the client to first authenticate, which means we would most likely get an
NTLM hash.
We can utilize the Responder to help us out conducting this attacks. The attack can be started with - d/--DHCP (WPAD
injection) argument. By default , a rouge WPAD server will be injection in the configuration.
-W/--wpad
One additional arguments and options should be sued when doing DHCP poisoning with -d/--DHCP argument. These are
option to start the WPAD rouge server so that fake wpad.dat file can be served to requesting clients (WPAD spoofing
attack)
we can use windows registry to find out if the organization windows Update server the organization using is is HTTP or
HTTPS.
First perform MITM via ARP spoofing between client and update server.
keep malicious WSUS server ready that will help us in sending the evil update to client .
We can use the pywsus to start the Evil WSUS server that will run an our choice binary and commands to run. eg :
Here we use Psexec Because it an windows binary and WSUS binary that are beign fetched should be microsoft sign only.
But we use PSExec to follow up the concept of LOLBINS.
Now once WSUS is ready, we can start MITM attack for that purpose we can use bettercap to easy the process use the
following bettercap caplets to get it running
any.proxy on
arp.spoof on
net.sniff on
Now when windows update are trigger (by default every 22 hour) we will get an command execution. we can also trigger an
update by navigating over to :
What is ASREPRoasting
It is an Active directory attack where the Kerberos authentication process is targeted. It specifically targets user accounts
that are not using Kerberos pre-authentication. That means that anyone can send an AS_REQ (request) to the DC on
behalf of any of those users, and receive an AS_REP (response) message. This message contains a chunk of data encrypted
with the original user key, derived from its password. Then, by using this message, the user password could be cracked
offline.
This attack doesn't need any Domain Account , Just a connection to DC . But if we have an Domain account we can
leverage the LDAP to find us the users accounts that have the flag (DONT_REQ_PREAUTH) . But we can also brute-force
the usernames via wordlist.
ultimately we can use the john the reaper or Hashcat to crack those hashes:
The man-in-the-middle position means that from the client’s point of view, the attacker’s machine is the server to which
he wants to authenticate, and from the server’s point of view, the attacker is a client like any other who wants to
authenticate.
The NTLM authentication message for relaying can be embedded in any protocol like SMB,HTTP,MSSQL,SMTP , IMAP. The
NTLM authentication protocols are "application protocol-independent". It means one can relay LM or NTLM
authentication messages over a certain protocol, say HTTP, over another, say SMB. That is called cross-protocols
LM/NTLM relay.
SMB
MS SQL
Relayed user credentials must be admin on machine , so that we get got execution.
We would need Responder and Imapcket's NTLMRealyx.py . We would need to do some configuration changes in
Responder config file . Such that SMB or HTTP listing mode are OFF , because we would be using NTLMRelayx to open
those ports for relaying the hashes .
HADESS.IO Pwning the Domain: Credentialess/Username
Now run the NTLMRelayx on the other terminal python ntlmrelayx.py -tf targets.txt -
smb2support
Here the targets.txt file should be all the clients in environment which has SMB Singing disabled , so that we can relay the
hashes. By-default NTLMRealayx would be performing DC sync and would be dumping the SAM databases of the client so
that we can get access.
If Extended Protection is disabled, one can relay to MSSQL . To Run This attack we would need Responder and
NTLMRelayx . in Responder's config file try to disable The MSSQL flag , so that it can be used efficiently by NTLMRelayx .
As you can see we got access to MSSQL database, now we can further abuse the database with stored procedures
xp_fileexist and xp_dirtree to get Command Execution.
HADESS.IO Pwning the Domain: Credentialess/Username
ASREPRoasting
AS-REP Roasting is an attack technique targeting weaknesses in the Kerberos authentication protocol used in Active
Directory environments. This attack allows an attacker to request encrypted Kerberos tickets for user accounts that do
not require pre-authentication. These encrypted tickets can then be offline brute-forced to obtain the user's password
hash. Rubeus.exe, a powerful tool for AD exploitation, includes a command specifically designed for executing AS-REP
Roasting attacks.
Rubeus.exe asreproast
This command initiates the AS-REP Roasting attack. By default, asreproast will target all users in the current domain who
have the "Do not require Kerberos preauthentication" flag set, making them vulnerable to this attack.
After executing the command, Rubeus.exe will output the obtained ticket data, including the encrypted Kerberos tickets.
This data can then be used for offline brute-forcing to obtain the user's password hash.
Once you have the encrypted tickets, you can use tools like Hashcat or John the Ripper to perform offline brute-force
attacks against them to obtain the user's password hash.
HADESS.IO Pwning the Domain: Credentialess/Username
Bruteforcing
Password spraying is a technique used by attackers to gain unauthorized access to user accounts in an Active Directory
domain by trying a few commonly used passwords against many accounts. Unlike traditional brute-force attacks, where a
large number of passwords are tried against a single account, password spraying involves trying a small number of
passwords against many accounts to avoid detection by account lockout policies. Here's how you can perform password
spraying in an Active Directory domain using various tools and commands:
Invoke Password Spraying with Rubeus:
ProxyShell
The ProxyShell vulnerability is a critical security issue affecting Microsoft Exchange servers. It comprises three separate
vulnerabilities: ProxyShell (CVE-2021-34473), ProxyLogon (CVE-2021-34474), and ProxyOracle (CVE-2021-34475). These
vulnerabilities allow attackers to bypass authentication mechanisms and gain unauthorized access to Exchange servers,
potentially leading to complete compromise of the server and the underlying Active Directory domain.
Attackers exploit the ProxyShell vulnerability by sending crafted HTTP requests to the Exchange server. By chaining the
three vulnerabilities, they can execute arbitrary commands on the server, leading to potential compromise.
https://github.com/ktecv2000/ProxyShell
ProxyLogon
The ProxyLogon vulnerability, tracked as CVE-2021-26855, is a critical security flaw affecting on-premises Microsoft
Exchange servers. Exploitation of this vulnerability can lead to unauthorized access to email accounts and potentially
complete compromise of the Exchange server and the underlying Active Directory domain. The ProxyLogon vulnerability
is part of the larger set of vulnerabilities known as ProxyShell.
Here's an overview of the ProxyLogon vulnerability and steps to mitigate it:
ProxyLogon allows attackers to execute arbitrary code on vulnerable Exchange servers without authentication, leading
to unauthorized access.
Attackers can exploit this vulnerability by sending crafted HTTP requests to the Exchange server, enabling them to
execute arbitrary commands and potentially take control of the server.
https://github.com/Udyz/Proxylogon
EternalBlue
The EternalBlue vulnerability, also known as CVE-2017-0144, is a critical security flaw that affects the SMBv1 protocol
implementation in various versions of Microsoft Windows operating systems. This vulnerability was famously exploited by
the WannaCry ransomware attack in 2017. EternalBlue allows remote attackers to execute arbitrary code on vulnerable
systems without authentication, potentially leading to complete compromise of the system and the underlying Active
Directory domain.
EternalBlue exploits a vulnerability in the SMBv1 protocol (specifically the Microsoft Server Message Block 1.0 file
sharing protocol) used for file and printer sharing on Windows systems.
Attackers can exploit this vulnerability by sending crafted SMB packets to vulnerable systems, enabling them to
execute arbitrary code and propagate malware across networks.
HADESS.IO Pwning the Domain: Credentialess/Username
SMBGhost
The SMBGhost vulnerability, also known as CVE-2020-0796, is a critical security flaw that affects the Server Message
Block (SMB) protocol version 3.1.1 in Microsoft Windows 10 and Windows Server versions 1903 and 1909. Exploitation of
this vulnerability could allow remote attackers to execute arbitrary code on vulnerable systems, potentially leading to
complete compromise of the system and the underlying Active Directory domain.
SMBGhost exploits a vulnerability in the way SMBv3 handles certain requests, specifically related to compression,
leading to a buffer overflow condition.
Attackers can exploit this vulnerability by sending crafted packets to vulnerable systems, allowing them to execute
arbitrary code and gain unauthorized access.
Options:Select Exploit: Choose between EternalBlue and DoublePulsar. The order matters.
Batch Exploitation: Perform exploitation on a list of target IP addresses provided in ip.txt.
Specify Payload DLL Name: Inject a specified DLL into the target process. The DLL architecture should match the
target system (x86 or x64). Some sample DLLs are provided in the dlls folder.
Payload DLLs:x64reboot.dll and x86reboot.dll: Restart the computer immediately.
x64createSysUser.dll and x86createSysUser.dll: Create a user account (requires administrator privileges).
Zerologon
The Zerologon vulnerability, tracked as CVE-2020-1472, is a critical security flaw affecting the Netlogon Remote Protocol
(MS-NRPC) in Microsoft Windows Server Active Directory domains. Exploitation of this vulnerability can allow attackers to
gain unauthorized access to domain controllers and potentially take control of the entire Active Directory domain.
Zerologon was discovered by researchers from Secura BV and publicly disclosed in August 2020.
Zerologon exploits a flaw in the cryptographic authentication mechanism used by the Netlogon protocol, allowing
attackers to bypass authentication and establish a vulnerable Netlogon secure channel connection.
Attackers can exploit this vulnerability to impersonate a domain controller and perform unauthorized actions, such as
changing passwords of domain accounts, creating new accounts with domain admin privileges, and accessing sensitive
data stored in Active Directory.
https://github.com/risksense/zerologon
PetitPotam
The PetitPotam vulnerability is a critical security flaw that affects the Microsoft Windows operating system's NTLM (NT
LAN Manager) authentication protocol. This vulnerability, tracked as CVE-2021-36942, can allow attackers to perform a
relay attack and compromise the authentication process, potentially leading to unauthorized access to sensitive
resources within the Active Directory domain.
PetitPotam exploits the Windows operating system's reliance on the NTLM authentication protocol for various
security operations, such as authenticating users and computers in an Active Directory environment.
Attackers can exploit this vulnerability by sending specially crafted RPC (Remote Procedure Call) requests to a domain
controller, tricking it into initiating an authentication process with a remote attacker-controlled server.
Once the authentication process is initiated, the attacker can capture the NTLM authentication response and use it to
perform a relay attack, potentially gaining unauthorized access to domain resources.
https://github.com/ly4k/PetitPotam
Website: Email
WWW.HADESS.IO [email protected]
To be the vanguard of cybersecurity, Hadess envisions a world where digital assets are safeguarded from malicious actors. We strive to create a secure digital ecosystem, where
businesses and individuals can thrive with confidence, knowing that their data is protected. Through relentless innovation and unwavering dedication, we aim to establish Hadess as a
symbol of trust, resilience, and retribution in the fight against cyber threats.