Hacks Weekly #3: Server Message Block - SMB Relay Attack

Sdílet
Vložit
  • čas přidán 11. 09. 2024

Komentáře • 27

  • @krzychaczu
    @krzychaczu Před 5 lety

    Paula, I am concerned. Last week at Microsoft Ignite in Amsterdam I spoke withe a person from Groningen university who told me about you and education services your company provides. Today, your video showed-up on YT recommendations...
    Very nice piece of work!
    Pozdrawiam serdecznie! Krzysztof

  • @wyattbecker
    @wyattbecker Před 5 lety +3

    I get a warm feeling inside when she says mehter-prehter

  • @RoyalGblues
    @RoyalGblues Před 6 lety +5

    you just broke my heart

  • @jerryxie777
    @jerryxie777 Před 5 lety

    as far as I know. Windows 7or 8 is using kerberos v5 for authentication. Why it still be relay attacked in your demo?

  • @Ultrajamz
    @Ultrajamz Před 5 lety +1

    Does this affect smb3 or smb2? Or just smb1?

  • @Scuijr808
    @Scuijr808 Před 8 lety +1

    Paula, the audio cuts out a 13:10.

  • @michaelcorrigan8819
    @michaelcorrigan8819 Před 8 lety

    Paula Very nice video I am getting stuck when executing command
    "Sending status code STATUS_SUCCESS after authentication to x.x.x.x
    [-] DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied" Any ideas what I could be doing wrong?

  • @GeekyGizmo007
    @GeekyGizmo007 Před 5 lety

    Does this work with NTLM v1?

  • @umarshaikh2448
    @umarshaikh2448 Před 6 lety

    Thanks for sharing the knowledge!!
    Vioce is too slow

  • @grandmapants
    @grandmapants Před 8 lety

    FYI:Note: As of 2015-06-08 msfpayload has been removed.
    What's the point using outdated tools? use msfvenom

    • @pjanuszkiewicz
      @pjanuszkiewicz Před 8 lety

      Absolutely! I have even said this. They are many options and if someone is used to msfpayload - that's the option too. In our Team we use our own (reflective) PE Loader - and this is the best option.

    • @sandeepsiva7183
      @sandeepsiva7183 Před 6 lety

      Hey, can u please explain me what does the second tab function is " as u said it delivers the payload in the client system to get executed" or I am wrong .....can u please explain briefly.
      and my second question is the hacker is already inside the network ryt?

  • @sami9348
    @sami9348 Před 6 lety

    Please try to improve your picture quality, i barely can see text of your monitor screen..

  • @rabinrai5838
    @rabinrai5838 Před 7 lety

    it says admin$ not writeable
    and Error opening SVCManager on target ip please help me i mentioned this in ur website

    • @rabinrai5838
      @rabinrai5838 Před 7 lety

      do i need windows server 2008 or similar ?

    • @Cybergh0st_17
      @Cybergh0st_17 Před 5 lety

      Got the same issue as you, did you find a solution ?

  • @bohelk
    @bohelk Před 8 lety

    This vid is good but im having a little problem, everytime I write \\192.168.1.8 (my kali linux ip) it tells me to write the username and password. how do I get them

    • @pjanuszkiewicz
      @pjanuszkiewicz Před 8 lety

      Thanks! I will need to have a bit more details :) Is it after you set up the attack? Is this address typed from one of the Windows machines in order to browse shares in Linux? Is there a way you can show me the output in Linux after launching the attack? For some reason it looks like SSO fails here. Do you have any GPOs set to deny communicating over the network when being a member of Local Admins? Tell me more please :) Share screens etc.

    • @bohelk
      @bohelk Před 8 lety

      at 9:24 when you entered the ip address in run, It opened the folder normally right? but when I do the same thing, it asks me about my username and password

    • @bohelk
      @bohelk Před 8 lety

      It's one of the windows machine

    • @bohelk
      @bohelk Před 8 lety

      Found the solution ! it was just the Windows Credential Thank you anways 😀😂

    • @ghadeeralsahwan2220
      @ghadeeralsahwan2220 Před 7 lety

      I am facing the same problem, could you please tell me how did you fix it exactly?

  • @j.bonatelli
    @j.bonatelli Před 8 lety +1

    So, where is the python script ?

    • @betusfreefly
      @betusfreefly Před 8 lety +3

      github.com/CoreSecurity/impacket/blob/master/examples/smbrelayx.py

  • @Preachingthechoirnow
    @Preachingthechoirnow Před 6 lety

    In love