Computer NetworksNETWORKS

How to gain password hashes via IPv6 using MITM6

Don’t forget to subscribe and like the video for continued Cyber Security viewing!

In this video you will see how it is trivial to steal password hashes when IPv6 is left enabled on a Windows network. This could mean an attacker creating a DHCP6 server to Man-In-The-Middle your Windows 10 hosts. This will in turn rain password hashes for many users, even domain administrator accounts!

~~~
This is an educational video, gain permission from target owners before attempting anything from this tutorial. By not doing so, you risk being penalised by the computer misuse act or equivalent in your country
~~~

MITM6: https://github.com/fox-it/mitm6
NTLMRelayx: https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py

Twitter: https://twitter.com/TurvSec

source

ipv6

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

Leave a Reply

Your email address will not be published. Required fields are marked *