EN
ENNA

PetitPotam

๐Ÿ”ฅ Offensive Ops ยท Python

PetitPotam is a tool that coerces Windows hosts into authenticating to an attacker-controlled server by abusing the Encrypting File System Remote Protocol (MS-EFSRPC). By sending specially crafted requests to the EfsRpcOpenFileRaw function (and similar EFS functions), PetitPotam forces the target machine to initiate an NTLM authentication to an arbitrary server specified by the attacker. When combined with NTLM relay attacks (via tools like ntlmrelayx from Impacket), this can be used to relay the authentication to Active Directory Certificate Services (AD CS) to obtain certificates, or to other services for privilege escalation. PetitPotam was a significant discovery because it works unauthenticated against domain controllers in many configurations, making it a critical vector for Active Directory domain compromise. Microsoft has issued patches, but many environments remain vulnerable.

2.2kstars
297forks
1issues
Updated 1y ago

Installation

from source

$ git clone https://github.com/topotam/PetitPotam && cd PetitPotam && pip install impacket

Use Cases

  • Coercing domain controllers to authenticate for NTLM relay attacks
  • Relaying machine authentication to AD CS for certificate-based domain compromise
  • Testing Active Directory environments for NTLM relay vulnerabilities
  • Demonstrating unauthenticated domain compromise paths in penetration tests
  • Validating PetitPotam mitigations (EPA, NTLM relay protections) are effective

Tags

ntlm-relaycoercionactive-directoryefsrpcdomain-compromiseadcs

More in Offensive Ops