Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NTLM-Relay攻击 | AnchorEureka' Blog #14

Open
justdoit-cai opened this issue Apr 8, 2024 · 0 comments
Open

NTLM-Relay攻击 | AnchorEureka' Blog #14

justdoit-cai opened this issue Apr 8, 2024 · 0 comments

Comments

@justdoit-cai
Copy link
Owner

https://justdoittt.top/2024/04/09/NTLM-Relay%E6%94%BB%E5%87%BB/

介绍也叫 NTLM 重放攻击,NTLM 中继攻击。 漏洞点这里要先了解 Windows系统名称解析顺序 。当我们访问一个共享时 net use \aaa ,其寻找这个主机名称会遵循以下的步骤: 本地 hosts 文件( %windir%\System32\drivers\etc\hosts ) DNS 缓存/ DNS 服务器 链路本地多播名称解析( LLMNR )和 NetBIOS

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant