📃
Internal Pentest
search
⌘Ctrlk
📃
Internal Pentest
  • Internal pentest
    • Active Directory
      • Core Concepts
      • Reconnaissance
      • Initial attack vectors
        • LLMNR/NBT-NS Poisoning
        • IPv6 Attacks
        • ASREPRoast
        • ADCS + PetitPotal NTLM Relay
      • Post-Compromise Enumeration
      • Post-Compromise Attacks
      • MISC
  • Cloud pentesting
    • Microsoft AZURE
    • AWS
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Internal pentestchevron-right
  2. Active Directorychevron-right
  3. Initial attack vectors

ADCS + PetitPotal NTLM Relay

Already explained pretty well in these both articles :

LogoADCS + PetitPotam NTLM Relay: Obtaining krbtgt Hash with Domain Controller Machine Certificate | Red Team Noteswww.ired.teamchevron-right
https://blog.truesec.com/2021/08/05/from-stranger-to-da-using-petitpotam-to-ntlm-relay-to-active-directory/blog.truesec.comchevron-right

PreviousASREPRoastchevron-leftNextPost-Compromise Enumerationchevron-right

Last updated 4 years ago