DHCPv6 Spoofing
Dynamic Host Configuration Protocol version 6
mitm6
Install:
Generate a list of targets for NTLM relay and prepare a C2 listener and stager:
Start SMB server to capture NTLM hashes and serve the stager:
Get ready to relay authentication and try executing a command:
Start MitMing:
Parse, sort and save NTLM hashes:
Attack vectors
Grab hashes with smbserver.py
(passive):
mitm6.py
poisons IPv6 DNS entries for all hosts in the/24
network.Victims start to use attacker's machine as the primary DNS server.
mitm6.py
on the attacker's machine acts like a rogue DNS server and responds with the attacker's IP for all incoming queries.smbserver.py
collects hashes during SMB requests from victims.
Relay authentication with ntlmrelayx.py (active):
mitm6.py
poisons IPv6 DNS entries for all hosts in the/24
network.Victims start to use attacker's machine as the primary DNS server.
mitm6.py
on the attacker's machine acts like a rogue DNS server,ntlmrelayx.py
serves a malicious WPAD file with an inexistent hostname (which will be resolved to the attacker's IP anyway) and acts like a rogue proxy server andmitm6.py
responds with the attacker's IP for all the incoming DNS queries.Victims grab the WPAD file and ask the rogue IPv6 DNS server (attacker's machine) to resolve its location - resolved to attacker's machine.
Victims go to the rogue proxy server and there
ntlmrelayx.py
responses withHTTP 407 Proxy Authentication
.
Last updated