I could hug you IRL right now lol. I'm a new Penetration tester and it seems like every person that taught me how to do it, all do it differently. This video was so clear and easy to understand I've added it to my notes. This 10 min video could have saved me HOURS if I saw it sooner. Keep up the great work brother!
I was trying for 3 days, when you said “the account try to attack make sure it's a local admin on your target server” then i realized what i did wrong. Man thank you so much ❤️🥺
You mentioned that the relay only really works if the user is an admin on the target machine. Do you typically execute this attack after you have "owned" the admin or hoping the admin will mistype the share drive (or maybe both)?
Hi, unfortunately I've been unable to conduct this attack. I'm able to start Responder and ntlmrelayx. However, the LLMNR poisoner is never sent by Responder. In addition, ntlmrelayx never picks up anything either. Both are running, and I made sure to follow the instructions. I disabled SMB signing as needed (I found some help online). My setup: latest Kali and updated tools. Windows Server 2019 VM using SMB 3 (learned version after using nmap as in the video), and Windows 10 VM client. Any guidance is appreciated. Thanks.
@@elevatecyber5031 I see. I just saw one of your older videos where you talked about and how we might be able to get some inspiration from how you'd do it ;)
I could hug you IRL right now lol. I'm a new Penetration tester and it seems like every person that taught me how to do it, all do it differently. This video was so clear and easy to understand I've added it to my notes. This 10 min video could have saved me HOURS if I saw it sooner. Keep up the great work brother!
Welcome to the channel. That's awesome to hear!
I was trying for 3 days, when you said “the account try to attack make sure it's a local admin on your target server” then i realized what i did wrong. Man thank you so much ❤️🥺
Came back to this like 5 times (=
You mentioned that the relay only really works if the user is an admin on the target machine. Do you typically execute this attack after you have "owned" the admin or hoping the admin will mistype the share drive (or maybe both)?
what if the target ip address is an internal ip? because internal ip of another network willnot show in our adapter right??
brother as a fellow content creator I know is hard to upload videos. but your content is good and helpful. you are good at what you do. thank you
Thanks for the support!
Hi, unfortunately I've been unable to conduct this attack. I'm able to start Responder and ntlmrelayx. However, the LLMNR poisoner is never sent by Responder. In addition, ntlmrelayx never picks up anything either. Both are running, and I made sure to follow the instructions. I disabled SMB signing as needed (I found some help online). My setup: latest Kali and updated tools. Windows Server 2019 VM using SMB 3 (learned version after using nmap as in the video), and Windows 10 VM client. Any guidance is appreciated. Thanks.
What happens if only existing shares are accessed? does the attack works?
Loving the explanations and demos of relevant attacks. Oh, and do you have a blog somewhere?
I actually don't. I need to start on one soon though
@@elevatecyber5031 I see. I just saw one of your older videos where you talked about and how we might be able to get some inspiration from how you'd do it ;)
Dickens Fort