OSINT and PHISHING

  • can check company emails to check if they’ve ever been in any breaches in sites like haveibeenpwed and deHashed. but those can be outdated sometimes so we’ll need to verify them using NTLM authed services.
  • room to do later since im broke and dont have premium :
  • same with phishing. phishing can be used to install a rat on the victims machine and have immediate inernal user impersonation capabilities.

NTLM Authenticated Services

  • NTLM auth is heavily utilised by services on a network. some of those services are sometimes exposed to the internet such as:
    • an internal microsoft exchange server that exposes and Outlook Web App (OWA)
    • RDP
    • VPN endpoints integrated with AD
    • Webapps in the DMZ that make use of NetNTLM