[thread] Hi hackers! @podalirius_ and I present to you this new tool πŸŒŸπŸŽ€ π–˜π–’π–†π–—π–™π–‡π–—π–šπ–™π–Š πŸŽ€πŸŒŸ

This tool allows for bruteforcing NTLM and Kerberos in Active Directory domains (there are A LOT of features, detailed in the thread below).

➑️ github.com/ShutdownRepo/s…
This tool offers two modes: smart and brute.

1⃣ Brute mode: can be used with a user and password/hash to test (or list of those).

2⃣ Smart mode: given a valid AD account credentials, it fetches the users list and lockout policies to bruteforce wihtout locking accounts.
Authentication attempts can be operated over NTLM (over SMB or LDAP) or Kerberos 🐢 (pre-authentication attacks).

Kerberos pre-authentication attempts can be operated through UDP (faster πŸš…) or TCP.
In the 1⃣ brute mode, the first valid auth triggers a basic AD enum to find out if bruteforced accounts are members or privileged groups (can be disabled).

When attempting auths over NTLM over SMB (brute & smart modes), a test is made to assert if the account is local admin Image
The AD enum triggered in 1⃣ brute mode is made right from the start in the 2⃣ smart mode.
1⃣ brute mode: when supplying user and password/hash lists, attempts can be made line per line instead of trying every password for each user (--line-per-line flag).

2⃣ smart mode: user list or lockout policies can be printed without bruteforcing (--users, --policy flags)
1⃣ brute and 2⃣ smart modes: a --delay can be set between each attempt. There is a --user-as-password flag, which is self-explainatory imho.
When attempting auths, passwords can be tried, but hashes too (NT hashes for NTLM (PtH), RC4 keys for Kerberos(OPtH)). Reminder: RC4 key == NT hash.
When using the 2⃣ smart mode, valid AD account's credentials are needed for the initial AD enums. That intial auth supports cleartext auth (NTLM, Kerberos) pass-the-hash (NTLM), pass-the-key/overpass-the-hash (Kerberos), pass-the-cache (type of pass-the-ticket) (Kerberos)
🐢 Kerberos pre-authentication attacks can be tailored to the user's desires. The etype to use in the AS_REQ can be chosen (RC4, AES128 or AES256) and the transport protocol too (UDP or TCP)
Bruteforced accounts can be set as owned in a neo4j database to be used with BloodHound. Users that are on a path to Domain Admin will be highlighted. Image
The tool supports multi-level verbosity (verbose, debug, and more...)
Smartbrute has been inspired by existing tools that partially do the work (sprayhound, kerbrute, pykerbrute, crackmapexec, impacket). There are blobs of code that have been heavily inspired (sometimes copy/pasta even) from those, so huge thanks to their contributors ! Image
❀️ @HackAndDo @byt3bl33d3r @ropnop @3gstudent @SecureAuth @agsolino @mpgn_x64 and many others that I'm probably forgetting πŸ˜…
Impacket does most of the heavy lifting behind it. We merely adapted a few things to go deeper or faster.
⚠️ This tool is currently in an alpha state. In order to become more and more reliable, it needs to go through some more IRL testing and debugging, expect the unexpected for now πŸ™ˆ
The tool may be tedious to use at first (the tool is pretty complete, hence complex to use. Not complicated though, complex.). The following picture may help understand how to use it. Basically, the tool is built around a parsers and multiple subparsers. Image

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Shutdown (Charlie Bromberg)

Shutdown (Charlie Bromberg) Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @_nwodtuhs

22 Jul
[thread] A lot of people since this finding are looking for a bit knowledge around that bug. Below is list of links that will help better understand this (attackers-side)
PetitPotam’s MS-EFSR abuse is the equivalent (even better) of the PrinterBug’s MS-RPRN abuse that’s been here for a while now

1️⃣ PrinterBug: thehacker.recipes/active-directo…
2️⃣ PetitPotam: thehacker.recipes/active-directo…
Coercing a machine’s authentication is a technique allows for the capture or relay of that auth.

1️⃣ capture: thehacker.recipes/active-directo…
2️⃣ relay: thehacker.recipes/active-directo…
Read 12 tweets
22 Apr
(infosec thread) one of my latest tweets was followed by some questions in my DMs. So let's answer those here and remind some concepts😈

I'll talk about pass-the-hash, pass-the-ticket, pass-the-key, overpass-the-hash, pass-the-cache, silver and golden tickets πŸ‘‡
Pass-the-Hash (1/4) : NTLM (LM, LMv2, NTLM or NTLMv2 depending on the version) is an authentication protocol used by Windows and AD-DS. Users have passwords, which are stored in a hashed format (LM or NT hash depending on the security settings and version).
Pass-the-Hash (2/4) : when authenticating to a remote service, the password hash is used to compute a ChallengeResponse. The LM hash is used for the LM version of the protocol while the NT hash is used for LMv2, NTLM and NTLMv2.
Read 25 tweets
21 Apr
@podalirius_ and I made GPP Passwords great again. We wrote a Python script, using Impacket, to find and decrypt passwords in Group Policy Preferences, without having to mount the remote share πŸ‘‡[a thread]

➑️ github.com/SecureAuthCorp…
The script can be directly added to Impacket's examples (like in the PR above) but it can also be run as a standalone tool (clone the repo below)

github.com/ShutdownRepo/G…
Just like all other Impacket examples, the logging is color-less and it can be quite a mess (with the -debug option)

However, grc (github.com/garabik/grc) can bring colors to the output
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(