IPv6 Attacks
Overview
Typically machines on networks run on IPv4, sometimes not even utilizing IPv6 at all but still have it enabled by default. In a network there is usually nobody doing DNS for IPv6
We can leverage this by replying to all DHCPv6 messages, giving them a Link-Local address and telling them that we're their default DNS server.
MITM6 paired with Impacket-ntlmrelayx using LDAP relaying, can allow us to pull a lot of information from the Domain Controller and even create a new user account in the Enterprise Admins group when a Domain Administrator logs into the network. This can allow us to run secretsdump against the Domain Controller.
IPv6 DNS Takeover
Mitigation
Disable IPv6
Block inbound and outbound DHCPv6
Block inbound ICMPv6
Disable WPAD via Group Policy (WinHttpAutoProxySvc)
Enable LDAP signing
Dont allow delegation for Administrative users
Last updated
Was this helpful?