Don’t forget to subscribe and like the video for continued Cyber Security viewing!

In this video you will see how it is trivial to steal password hashes when IPv6 is left enabled on a Windows network. This could mean an attacker creating a DHCP6 server to Man-In-The-Middle your Windows 10 hosts. This will in turn rain password hashes for many users, even domain administrator accounts!

~~~
This is an educational video, gain permission from target owners before attempting anything from this tutorial. By not doing so, you risk being penalised by the computer misuse act or equivalent in your country
~~~

MITM6: https://github.com/fox-it/mitm6
NTLMRelayx: https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py

2 views

Leave a Reply

Your email address will not be published. Required fields are marked *