Learn how to automate the process of escalating from zero access to domain admin using only two powerful tools in this 47-minute conference talk from Circle City Con 5.0. Explore techniques such as MITM6 setup, Docker Harvester, Windows Responder, NTLM Relay, and SMB Signing. Dive into NTLM hashes, commands, and tools like Invoke Power Dump and Icebreaker. Watch a live demonstration of LSA Query Attack and understand various attack methods including NTLM Relay, NTLM Responder, and Empire. Gain insights into advanced penetration testing and network security vulnerabilities.
Overview
Syllabus
Intro
Overview
MITM6 Setup
Docker
Harvester
Windows
Responder
NTLM Relay
SMB Signing
NTLM Hash
NTLM hashes
NTLM
NTLM Commands
Invoke Power Dump
Icebreaker
Live Demo
LSA Query
Attack
Attack 4 NTLM Relay
Attack 5 NTLM Responder
Attack 6 Empire