The Hacker Recipes
GitHubTwitterExegolTools
Search…
⌃K
Links
Introduction
Active Directory
Reconnaissance
Movement
Credentials
MITM and coerced auths
ARP poisoning
DNS spoofing
DHCP poisoning
DHCPv6 spoofing
WSUS spoofing
LLMNR, NBT-NS, mDNS spoofing
ADIDNS poisoning
WPAD spoofing
MS-EFSR abuse (PetitPotam)
MS-RPRN abuse (PrinterBug)
MS-FSRVP abuse (ShadowCoerce)
MS-DFSNM abuse (DFSCoerce)
PushSubscription abuse
WebClient abuse (WebDAV)
🛠️ NBT Name Overwrite
🛠️ ICMP Redirect
🛠️ Living off the land
NTLM
Kerberos
DACL abuse
Group policies
🛠️ Trusts
Netlogon
Certificate Services (AD-CS)
SCCM / MECM
Exchange services
Print Spooler Service
Built-ins & settings
Persistence
Web services
Reconnaissance
Configuration
Accounts and sessions
User inputs
Systems & services
Reconnaissance
Initial access (protocols)
Initial access (phishing)
Privilege escalation
Pivoting
🛠️ Physical
Locks
Networking
Machines
Super secret zones
🛠️ Intelligence gathering
CYBINT
OSINT
GEOINT
🛠️ RADIO
RFID
Bluetooth
Wi-Fi
Wireless keyboard/mouse
🛠️ mobile apps
Android
iOS
Powered By GitBook

🛠️ ICMP Redirect

python3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2
need iptable
Understanding ICMP Redirect Messages
Cisco
Responder/tools/ICMP_Redirect.py
Previous
🛠️ NBT Name Overwrite
Next
🛠️ Living off the land
Last modified 1yr ago
Copy link