PetitPotam
๐ฅ Offensive Ops ยท Python
PetitPotam is a tool that coerces Windows hosts into authenticating to an attacker-controlled server by abusing the Encrypting File System Remote Protocol (MS-EFSRPC). By sending specially crafted requests to the EfsRpcOpenFileRaw function (and similar EFS functions), PetitPotam forces the target machine to initiate an NTLM authentication to an arbitrary server specified by the attacker. When combined with NTLM relay attacks (via tools like ntlmrelayx from Impacket), this can be used to relay the authentication to Active Directory Certificate Services (AD CS) to obtain certificates, or to other services for privilege escalation. PetitPotam was a significant discovery because it works unauthenticated against domain controllers in many configurations, making it a critical vector for Active Directory domain compromise. Microsoft has issued patches, but many environments remain vulnerable.
Installation
from source
$ git clone https://github.com/topotam/PetitPotam && cd PetitPotam && pip install impacketUse Cases
- Coercing domain controllers to authenticate for NTLM relay attacks
- Relaying machine authentication to AD CS for certificate-based domain compromise
- Testing Active Directory environments for NTLM relay vulnerabilities
- Demonstrating unauthenticated domain compromise paths in penetration tests
- Validating PetitPotam mitigations (EPA, NTLM relay protections) are effective
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- Python
- Repository
- topotam/PetitPotam
- Platforms
- ๐งlinux๐ชwindows
Links
Alternatives & Comparisons
Responder
PythonLLMNR/NBT-NS/mDNS poisoner and rogue authentication server. Captures NTLMv1/v2 hashes on the network.
Compare PetitPotam vs ResponderImpacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
Compare PetitPotam vs ImpacketMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.