A French security researcher named “Gilles Lionel” has discovered a security issue on Windows OS using which an attacker can force the remote windows machines to authenticate and its NTLM password hashes.

The Security researcher has nicknamed this issue as “PetitPotam” and releases the POC code earlier this week on his Github page.

Additionally, Researcher explained that this issue exists due to the abuses on MS-EFSRPC protocol which enables the windows machines to process operations on the encrypted data stored on remote systems.

The POC code shared by the researchers works by sending the SMB requests to MS-EFSRPC interface of the remote system and force it to start the authentication procedure to spit out its NTLM authentication hash.

Researchers believe that its a very dangerous issue which could force the DC’s to spit out the hashes that can also lead to complete takeover of corporate’s internal network.

https://platform.twitter.com/widgets.js

One of worrying thing about this attack is that despite of disabling the support for MS-EFSRPC on the target system, this attack does not fails.

As of now that this specific attack has been tested on Windows 10, Windows Server 2016 and Windows Server 2019, However, Security researchers believe that this attack might be possible throughout the available windows OS version available in the market. Unfortunately

“The problem with this type of attack is that it will take a considerable amount of time and considerations to develop appropriate countermeasures, These are design flaws that are more difficult to fix. It’s much easier to just patch a vulnerable font driver DLL or Internet Explorer library,” Florian Roth, told to the third party site The Record.

However, Microsoft plans to issue a rough patch for this vulnerability which can take some time.

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1

One thought on “New Windows Attack “PetitPotam” Forces Windows Hosts To Share NTLM Hashes.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s