Skip to content

Conversation

@ShutdownRepo
Copy link
Member

Original PR on fortra/impacket: fortra#1425

Adapted the sccmwtf by @_xpn_ into a httpattack for ntlmrelayx.py. Credits go to him for almost all of the code included in this PR.

The attack requires machine account authentication for the relay, easily achieved with Printerbug, PetitPotam, or any other auth coercion mechanism. The relayed auth is then used to authenticate to the target SCCM server over HTTP and ultimately request the NAAConfig policy. Link to XPN's associated blog for full details.

Example:
image

Successful attack results in naapolicy.xml being written to disk, which contains the NetworkAccessUsername and NetworkAccessPassword blobs that can be decrypted with C code provided in the sccmwtf repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants