Domain Admin via IPv6 DNS Takeover

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ก.พ. 2025
  • Get my:
    25 hour Practical Ethical Hacking Course: www.udemy.com/...
    Windows Privilege Escalation for Beginners Course: www.udemy.com/...
    In this video, we explore obtaining domain admin via IPv6 takeover with mitm6
    Blogs:
    dirkjanm.io/wo...
    blog.fox-it.co...
    ❓Info❓
    ___________________________________________
    Need a Pentest?: tcm-sec.com
    Learn to Hack: academy.tcm-se...
    🔹The Cyber Mentor Merch🔹
    ___________________________________________
    teespring.com/...
    📱Social Media📱
    ___________________________________________
    Website: thecybermentor...
    Twitter: / thecybermentor
    Twitch: / thecybermentor
    Discord: tcm-sec.com/di...
    LinkedIn: / heathadams
    💸Donate💸
    ___________________________________________
    Like the channel? Please consider supporting me on Patreon:
    / thecybermentor
    Support the stream (one-time): streamlabs.com...
    Hacker Books:
    Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
    The Hacker Playbook 3: amzn.to/34XkIY2
    Hacking: The Art of Exploitation: amzn.to/2VchDyL
    The Web Application Hacker's Handbook: amzn.to/30Fj21S
    Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
    Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
    Linux Basics for Hackers: amzn.to/34WvcXP
    Python Crash Course, 2nd Edition: amzn.to/30gINu0
    Violent Python: amzn.to/2QoGoJn
    Black Hat Python: amzn.to/2V9GpQk
    My Build:
    lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
    darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
    EVGA 2080TI: amzn.to/30d2lj7
    MSI Z390 MotherBoard: amzn.to/30eu5TL
    Intel 9700K: amzn.to/2M7hM2p
    G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
    Razer Nommo Chroma Speakers: amzn.to/30bWjiK
    Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
    CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
    Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
    My Recording Equipment:
    Panasonic G85 4K Camera: amzn.to/2Mk9vsf
    Logitech C922x Pro Webcam: amzn.to/2LIRxAp
    Aston Origin Microphone: amzn.to/2LFtNNE
    Rode VideoMicro: amzn.to/309yLKH
    Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
    Elgato Cam Link 4K: amzn.to/2QlicYx
    Elgate Stream Deck: amzn.to/2OlchA5
    *We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 87

  • @TCMSecurityAcademy
    @TCMSecurityAcademy  3 ปีที่แล้ว +2

    I hope you enjoyed this video! If so, please consider dropping a like and subscribing.

  • @martinarganaraz6553
    @martinarganaraz6553 5 ปีที่แล้ว

    Eres un genio...a pesar de que me cuesta entender un poco por el idioma :( me ayudaste muchisimo...saludos desde Argentina

  • @moblemeh152
    @moblemeh152 5 ปีที่แล้ว +1

    Every video i appreciate u more man !
    Again thank you very much for the hard work!!

  • @chiragartani
    @chiragartani 3 ปีที่แล้ว

    This is awesome. What is the severity of this vulnerability?

  • @VerschuurenMusic
    @VerschuurenMusic 5 ปีที่แล้ว +2

    This is amazing, surely going to try this myself.

  • @Naeidea
    @Naeidea 5 ปีที่แล้ว +3

    This is how i fooled a company into believing i worked for them. The conversion went something like this.
    "I don't have a badge or ID or name tag, can I get in?"
    "No of course not! We need to verify your identity!"
    "I'm an enterprise admin, you can look me up."
    "Name?"
    "It's: wSDJQWed£"
    "Oh great I see you listed, you may go through, speak to HR for an ID badge and access card!"
    "Thanks, have a nice day!"
    That's the story of my successful infiltration.

  • @himanshushukla8830
    @himanshushukla8830 4 ปีที่แล้ว +3

    can anyone help?
    i am not getting the loot folder on the directory and also its not authenticating

  • @southernfrechman
    @southernfrechman 5 ปีที่แล้ว +1

    Thanks for this video. Your footages are very didactic 👍🙏

  • @agustinguillen5635
    @agustinguillen5635 ปีที่แล้ว

    Hey great video. At this point would you already need to be in the victim’s network? Would it be able to be done through fishing, sending a link to open the command? Am doing a final project for school and I chose this vulnerability.

  • @karthibalaji3817
    @karthibalaji3817 5 ปีที่แล้ว +2

    Valuable content. Sweeeeet !

  • @meriemlaroui2649
    @meriemlaroui2649 3 ปีที่แล้ว

    You're simply the best ! thank youuu

  • @darylg3560
    @darylg3560 5 ปีที่แล้ว +3

    This is mind boggling! How on earth are you able to create a Domain Admin account without any Admin credentials? I feel like I blinked somewhere and missed something!

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว

      We're utilizing the relayed administrator hash from the login to create the creds

    • @darylg3560
      @darylg3560 5 ปีที่แล้ว

      @@TCMSecurityAcademy Thanks! I don't really understand why the client knows the administrator hash as it is! Looks like I've got a lot more work to do...!

    • @TheRealGhosty
      @TheRealGhosty 5 ปีที่แล้ว

      @@darylg3560 the client will know the hash as that's stored in the SAM database. When password is entered its encrypted and compared to the hash in database.. if both match you login

    • @TheRealGhosty
      @TheRealGhosty 5 ปีที่แล้ว

      @@darylg3560 also the hashing algorithm which is used for windows authentication is NTLM which sucks and microsoft should do better

  • @Biska_Wolf
    @Biska_Wolf 5 ปีที่แล้ว

    So cool! Thanks for sharing this TCM!

  • @brettnieman3453
    @brettnieman3453 5 ปีที่แล้ว +2

    Good vid bud! You going to do one too on setting up an AD lab?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว

      Yes. Incoming next week at some point. After Christmas probably!

  • @christianleonel2717
    @christianleonel2717 5 ปีที่แล้ว +1

    Thanks for sharing your knowledge with us.

  • @michaelmyers4484
    @michaelmyers4484 4 ปีที่แล้ว

    Is there any way to catch any of the relaying or enumeration from the blue team side? Or block the creation of the new ACL?

  • @nicksmith01uk
    @nicksmith01uk 4 ปีที่แล้ว +1

    Can you please explain what you did when installing the AD Certificate Services? This is key to this working and i cant replicate without this information. Thanks!

    • @SamerLOLOfficial
      @SamerLOLOfficial 4 ปีที่แล้ว

      This attack won't work if it didn't install. because we use ldaps.

  • @eed5278
    @eed5278 4 ปีที่แล้ว

    Amazing video! Speaking about mitm, is ICMP redirect attack, deprecated ? Does it work on windows 10?

  • @KL-og8gg
    @KL-og8gg 5 ปีที่แล้ว

    Anyway to not let it create the user which more stealthy? 😁 btw, good tut👍

  • @himanshushukla8830
    @himanshushukla8830 4 ปีที่แล้ว

    what version of OPENSSL you used in this video?

  • @dadquestionmark
    @dadquestionmark 5 ปีที่แล้ว +1

    Awesome sauce

  • @crimsonzodiac908
    @crimsonzodiac908 5 ปีที่แล้ว +1

    This is very interesting

  • @Furze2
    @Furze2 5 ปีที่แล้ว +1

    Nice video TCM. I assume this would also work in a Linux environment using Windows Active Directory LDAP?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว

      As long as the credential can authenticate to the DC, yes.

  • @marshallmatthers2690
    @marshallmatthers2690 5 ปีที่แล้ว +2

    Does this require the DC to have a CA installed on it so LDAPS can be used?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว

      That is correct, yes.

    • @wesleyfancher4280
      @wesleyfancher4280 5 ปีที่แล้ว

      A Ca on a dc is already a lose

    • @null_1065
      @null_1065 5 ปีที่แล้ว +1

      DC= domain controller, CA= certificate authority, LDAPS= lightweight directory access protocol system?

  • @kusmanlast4183
    @kusmanlast4183 5 ปีที่แล้ว

    Great video..
    Can we look towards any radio frequency testing tutorial,
    Is It possible?

  • @kingkong3723
    @kingkong3723 5 ปีที่แล้ว

    Can you make a video include teaching nmap from basic to advance , tip , and how to exploit from that ? Thanks so much

  • @elikelik3574
    @elikelik3574 5 ปีที่แล้ว

    8:15 so it means we are creating for us a user and the admin does not about it, did I got it right?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +1

      Well, it can be picked up by detection systems. Lots of places have alerts for when a domain admin is created.

  • @ZikzakHD
    @ZikzakHD 5 ปีที่แล้ว +2

    Could you make a video to protect our self from that attack, I think I'm being attacked by it

    • @kurti4432
      @kurti4432 5 ปีที่แล้ว +2

      Disable it 🤷‍♂️

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +1

      Read the blog post provided. It talks through how to prevent.

  • @zionstemple
    @zionstemple 5 ปีที่แล้ว +1

    M4V3R1C marvelous you tube cast. Thanks so much.

  • @vertexvstore155
    @vertexvstore155 2 ปีที่แล้ว

    Man keep it lit

  • @adb7627
    @adb7627 5 ปีที่แล้ว +3

    Very Interesting.
    Can you make videos for OSCP preparation ?

    • @dadquestionmark
      @dadquestionmark 5 ปีที่แล้ว +2

      Look at the Zero-to-Hero course.

  • @SamerLOLOfficial
    @SamerLOLOfficial 4 ปีที่แล้ว

    I ran into a serious problem and I hope The Cyper Mentor help me in this.
    I followed all the steps in the video, and When I attack ThePunisher or Spiderman computers I get the loot folder and get success for the attack, but when I do the same step for Administrator, I don't get anything... It's like doing nothing.
    why is that happens?
    I tried restart, logout, change user re run the scripts. all the same.

    • @andretti-s2w
      @andretti-s2w ปีที่แล้ว

      Same here...did you ever get a response?

  • @keerthivasan8061
    @keerthivasan8061 5 ปีที่แล้ว

    Kindly give your Udemy course link bro

  • @abrahamfabian1191
    @abrahamfabian1191 5 ปีที่แล้ว +5

    my school got ipv6 without using it :D

    • @ericcolt8078
      @ericcolt8078 5 ปีที่แล้ว +6

      FBI open UP !

    • @upup5133
      @upup5133 5 ปีที่แล้ว

      ​@@ericcolt8078 HAHAHAHAHAHA

  • @BrandonWilbur
    @BrandonWilbur 5 ปีที่แล้ว

    To pull this off, you need to be sitting on a network segment where you can about sniff another user's DNS traffic, right?

    • @ericcolt8078
      @ericcolt8078 5 ปีที่แล้ว +5

      If an attacker is on the local network, either physically (via a drop device) or via an infected workstation, it is possible to perform a DNS takeover using mitm6, provided IPv6 is not already in use in the network. When this attack is performed, it is also possible to make computer accounts and users authenticate to us over HTTP by spoofing the WPAD location and requesting authentication to use the rogue proxy.
      Read the blogpost in the description good read !

    • @stevecampbell8697
      @stevecampbell8697 5 ปีที่แล้ว +2

      Yes, and no. You do have to be on the same network segment, but you’re sniffing for other users DHCPv6 traffic and replying with an offer since an IPv6 DHCP scope isn’t defined. When you become the DHCPv6 server, Windows will prefer it over IPv4 DNS and lets you hijack DNS lookups and perform relaying when you intercept the authentication. One of the web pages mentioned in the video explains it in depth.

    • @TJGermany
      @TJGermany 5 ปีที่แล้ว +1

      In a normal setup the switch won't route DNS requests to your PC, but only to the DNS server. With a rogue IPv6-DHCP/DHCPv6 you can advertise your own computer as DNS server, and alone from this sniff other user's DNS traffic. And then you can perform MITM. No ARP hijacking necessary anymore.

    • @serjjustserj9790
      @serjjustserj9790 5 ปีที่แล้ว

      Long time we been without u ((( miss u, Master! Come baaaack with more vids please ;) 🕺🕺🕺

  • @apsodric
    @apsodric 5 ปีที่แล้ว

    So defending against that attack is disabling ipv6?

    • @TJGermany
      @TJGermany 5 ปีที่แล้ว +2

      No. Employ IPv6 and don't leave it unmanaged. Also use IPv6 RA guard on your switches. Similar what you do for DHCPv4 snooping.

    • @sonickyle
      @sonickyle 5 ปีที่แล้ว +3

      Have a look at the mitigation section of the URL below (also featured in the video)
      dirkjanm.io/worst-of-both-worlds-ntlm-relaying-and-kerberos-delegation/

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว

      Kyle has the correct answer.

  • @sharathkumark9692
    @sharathkumark9692 4 ปีที่แล้ว

    Can anyone help me a website to download windows 10 iso images (for desktop and for server)

  • @asmfahim2551
    @asmfahim2551 2 ปีที่แล้ว

    Does this attack works anymore?

  • @pamelaarmstrong3612
    @pamelaarmstrong3612 5 ปีที่แล้ว

    This is pretty cool. Can you share at what point you would be able to run this kind of attack? I'm guessing you would already need to be in the victims network via other means to be able to run this. Correct? Also, what lens are you using with your Lumix? I'm trying to get a TH-cam channel started myself. No competition for you. Totally different take. Thanks!

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +1

      DM'd already. Just noting it here so I don't forget :)

  • @maxmusterspace6037
    @maxmusterspace6037 5 ปีที่แล้ว +1

    Atm I am running into all sorts of problems. ntlmrelayx gives me these errors:
    [-] Exception in HTTP request handler: '>=' not supported between instances of 'int' and 'NoneType'
    [-] Exception in HTTP request handler: [Errno 104] Connection reset by peer
    while mitm6 tries to spoof wpad.sub.domain.tld even though I named my wpad - "fakewpad".
    At one point ntlmrelayx did "something" - but failed anyways:
    [*] SMBD-Thread-3: Received connection from ::ffff:192.168.1.50, attacking target ldaps://Lab-DC01.sub.domain.tld
    [-] Connection against target ldaps://Lab-DC01.sub.domain.tld FAILED: invalid server address
    lab-dc01.sub.domain.tld is my address.
    Something is weired here. Maybe you could include your Lab-Setup into your videos so we can follow along?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +3

      I'll be releasing a lab build video next week :)

    • @maxmusterspace6037
      @maxmusterspace6037 5 ปีที่แล้ว

      @@TCMSecurityAcademy Thats awesome!! Thanks.

  • @zionstemple
    @zionstemple 5 ปีที่แล้ว +1

    The only defense against this attack that I am currently aware of is disabling IPv6 if it is not used on your internal network. should stop Windows clients querying for a DHCPv6 server however Microsoft says that certain parts of its OS may not work if you disable IPV6???? Fail bus plows into blueteam.

    • @zionstemple
      @zionstemple 5 ปีที่แล้ว

      or to block DHCPv6 traffic and incoming router advertisements in Windows Firewall via Group Policy just read the other article.

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +1

      It's a little more complex than that. The Dirk article has way more details.

  • @aldovrover6494
    @aldovrover6494 2 ปีที่แล้ว

    Jerkjanm 😂

  • @chefdeprestigellc8855
    @chefdeprestigellc8855 5 ปีที่แล้ว

    Dope

  • @pentestical
    @pentestical 5 ปีที่แล้ว +1

    0 dislikes

  • @carlopasswords7083
    @carlopasswords7083 5 ปีที่แล้ว

    Does this only work in localhost ?

  • @charliecharliecharliecharl8554
    @charliecharliecharliecharl8554 2 ปีที่แล้ว

    My hackers using IPv6

  • @xreplayzx117replayziscool6
    @xreplayzx117replayziscool6 5 ปีที่แล้ว +1

    What’s up?

  • @andretti-s2w
    @andretti-s2w ปีที่แล้ว

    I ran into a serious problem and I hope The Cyper Mentor help me in this.
    I followed all the steps in the video, and When I attack ThePunisher or Spiderman computers I get the loot folder and get success for the attack, but when I do the same step for Administrator, I don't get anything... It's like doing nothing.
    why is that happens?
    I tried restart, logout, change user re run the scripts. all the same.