Infiltr8: The Red-Book
Ctrlk
Infiltr8ForumGitHub
  • The Red-Book
  • Red-Teaming
    • Reconnaissance
    • Execution
    • Initial Access
    • Persistence
    • Defense Evasion
    • Discovery
    • Privilege Escalation
    • Credential Access
    • Lateral Movement
    • Exfiltration
  • Web Pentesting
    • Reconnaissance
    • Infrastructures
    • Web Vulnerabilities
  • Network Pentesting
    • Network services
    • WiFi
    • Bluetooth
  • Active Directory Pentesting
    • Reconnaissance
    • Movement
      • Credentials
      • MITM and coerced auths
        • ARP poisoning
        • DNS spoofing
        • DHCP poisoning
        • DHCPv6 spoofing
        • WSUS spoofing
        • LLMNR, NBT-NS, mDNS spoofing
        • ADIDNS poisoning
        • WPAD spoofing
        • MS-EFSR abuse (PetitPotam)
        • MS-RPRN abuse (PrinterBug)
        • MS-FSRVP abuse (ShadowCoerce)
        • MS-DFSNM abuse (DFSCoerce)
        • MS-EVEN abuse (CheeseOunce)
        • PushSubscription abuse
        • WebClient abuse (WebDAV)
        • Living off the land
        • 🛠️NBT Name Overwrite
        • 🛠️ICMP Redirect
      • NTLM
      • Kerberos
      • Netlogon
      • DACL abuse
      • Group policies
      • Trusts
      • Certificate Services (AD-CS)
      • Schannel
      • SCCM / MECM
      • Exchange services
      • Print Spooler Service
      • Built-ins & settings
    • Persistence
  • Smart Contracts Pentesting
    • 🛠️On-Chain Analysis
    • Smart Contract Vulnerabilities
  • 🛠️Cloud & CI/CD Pentesting
    • CI/CD
    • Azure Pentesting
    • GCP Pentesting
    • AWS Pentesting
Powered by GitBook
On this page
Edit
  1. Active Directory Pentesting
  2. Movement
  3. MITM and coerced auths

🛠️NBT Name Overwrite

https://twitter.com/PythonResponder/status/1379251124985851904

Last updated 2 years ago

Was this helpful?

Was this helpful?