Skip to content

Advanced

Kevin Robertson edited this page Feb 10, 2021 · 5 revisions

Connection Endpoints

DHCPv6 or the ADIDNS (coming soon) WPAD attack can be leveraged to capture hashes from default connection endpoints. Windows reaches out to endpoints for weather updates, etc. A lot of these connections are under a user context. User hashes can be captured without requiring the logged in users to perform any actions.

Most of the connections are over HTTPS so proxy auth works well. I've had limited success triggering authentication directly from the few that are HTTP.

Unprivileged Local DNS Injection

DHCPv6 spoofing can be conducted against the host running Inveigh in order to add a DNS server to the list.

  • Example
    Inveigh.exe -Elevated N -DHCPv6 Y -DHCPv6Local Y
Clone this wiki locally