CVE-2021-42287/CVE-2021-42278 exploits in powershell
A simple script to attack AD with CVE-2021-42287/CVE-2021-42278 exploits automatically.
Menu
- Invoke-sAMSpooofing
- Invoke-GoldenTicket
- Invoke-GoldenTips
- RemoveMachineAccount
- Invoke-Rubeus
- ADSIHound
- Invoke-DCSync
-
Invoke-sAMSpooofing
![image](https://user-images.githubusercontent.com/30458572/161314691-fbb6059b-5440-48c6-a80c-51452cd42af0.png)
-
Invoke-GoldenTicket (Just krbtgt hashes needed)
![image](https://user-images.githubusercontent.com/30458572/161314959-86eb3237-382a-401e-bbb9-eae8a09da42f.png)
Golden ticket also injected into memory and generate to file.
![image](https://user-images.githubusercontent.com/30458572/161317716-b5407954-4a03-43b7-be2d-c50278c504aa.png)
-
Invoke-GoldenTips
![image](https://user-images.githubusercontent.com/30458572/161371534-1a1037e4-617b-47d3-9505-2940ad0f3015.png)
-
RemoveMachineAccount (Need domain admins privileges, also you can do this after create golden ticket.)
![image](https://user-images.githubusercontent.com/30458572/161236648-8ce72238-2d48-4794-97d0-5d5a667cc152.png)
-
Invoke-Rubeus
![image](https://user-images.githubusercontent.com/30458572/161241261-b5e5f4f8-29d9-4412-ae3e-1298d45b5625.png)