TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Impacket Offense Basics With an Azure Lab

Kassie Kimball · 2022-06-01 · Read original ↗

ATT&CK techniques detected

12 predictions
T1087.002Domain Account
99%
"more ntlmrelayx. py is capable of, and should desire sufficiently warrant, we will put together an even deeper dive. however, let ’ s take a look at a couple more tools in the impacket library before concluding this write - up. getadusers. py the getadusers. py class can turn tha…"
T1557.001Name Resolution Poisoning and SMB Relay
84%
"has admin privileges on the target system, ntlmrelayx dumps nt hashes through the remote registry service. an attacker can also attack ldap services listening on domain controllers. in its most basic form, that attack looks something like the next command. you would need to swap …"
T1552.006Group Policy Preferences
83%
"before i go hunting for this output. this is only an opinion and is subject to change. get - gpppassword. py contrary to getadusers. py and its infrequent use in my arsenal, the get - gpppassword. py class is more commonly used. this is a quick check against microsoft ’ s uninten…"
T1087.002Domain Account
76%
"##lmrelayx. py - t ldaps : / / dc01. doazlab. com - ts - l / opt / impacket / loot - - add - computer bhisblog47 - - dump - laps - - no - dump - - no - da - - t : target specification, in this case, the secure ldap listener on a dc - - ts : add timestamps to the console output - …"
T1003.003NTDS
67%
"##dump. py doazlab / doadmin : ' dolabadmin1! ' @ 192. 168. 2. 5 | tee - a / opt / hashes / secrets - output. txt this attack is surprisingly hard to detect with standard windows optics, but we will cover that discussion in the defensive tactics companion write up. the second sec…"
T1187Forced Authentication
61%
"##y listener setup below targets an smb listener on a remote server ( ws05. doazlab. com ). this attack emulates mitre att & ck t1557 : adversary in the middle. https : / / attack. mitre. org / techniques / t1557 / 001 / the following commands launch the virtual environment insta…"
T1547.009Shortcut Modification
56%
"generate the shortcut file – lnk – and target the ntlmrelayx listener. cd c : \ mkdir c : \ file6 new - smbshare - name " file6 " - path " c : \ file6 " - changeaccess " users " - fullaccess " administrators " $ objshell = new - object - comobject wscript. shell $ lnk = $ objshel…"
T1557.001Name Resolution Poisoning and SMB Relay
56%
"##y listener setup below targets an smb listener on a remote server ( ws05. doazlab. com ). this attack emulates mitre att & ck t1557 : adversary in the middle. https : / / attack. mitre. org / techniques / t1557 / 001 / the following commands launch the virtual environment insta…"
T1187Forced Authentication
47%
"has admin privileges on the target system, ntlmrelayx dumps nt hashes through the remote registry service. an attacker can also attack ldap services listening on domain controllers. in its most basic form, that attack looks something like the next command. you would need to swap …"
T1525Implant Internal Image
37%
"impacket offense basics with an azure lab impacket offense basics with an azure lab overview the following description of some of impacket ’ s tools and techniques is a tribute to the authors, secureauthcorp, and the open - source effort to maintain and extend the code. https : /…"
T1557.001Name Resolution Poisoning and SMB Relay
34%
"sufficient relayed privileges ) wreaked havoc on the target domain. we need to understand what is happening under the hood a bit more. the following invocation is closer to a standard approach for me, and we will talk about each of the flags and why. ntlmrelayx. py - t ldaps : / …"
T1003OS Credential Dumping
33%
"kerberos ticket hashes from a domain. this attack is classified as a sub - technique of mitre att & ck t1558, steal or forge kerberos tickets. python3. 9 getuserspns. py ' doazlab. com ' / ' doadmin ' : ' dolabadmin1! ' - dc - ip 192. 168. 2. 4 - outputfile / opt / hashes / kerbs…"

Summary

Jordan Drysdale // Overview The following description of some of Impacket’s tools and techniques is a tribute to the authors, SecureAuthCorp, and the open-source effort to maintain and extend the […]

The post Impacket Offense Basics With an Azure Lab appeared first on Black Hills Information Security, Inc..