diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/General.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/General.tsx index d8d9f371b..a18610aa7 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/General.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/General.tsx @@ -30,7 +30,7 @@ const General: FC = () => { - Click on Composition to view the certificate templates and vulnerable enterprise CA servers that enable + Click on Relay Targets to view the certificate templates and vulnerable enterprise CA servers that enable certificate enrollment for the target computer. diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/LinuxAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/LinuxAbuse.tsx index ad348b7e9..af8514d3c 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/LinuxAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/LinuxAbuse.tsx @@ -23,11 +23,13 @@ const LinuxAbuse: FC = () => { <> Examples of this attack are detailed in the following blog post: -
  • - - I’m bringing relaying back: A comprehensive guide on relaying anno 2022 - -
  • +
    diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/WindowsAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/WindowsAbuse.tsx index b6d61fe30..dbd5dbaff 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/WindowsAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/WindowsAbuse.tsx @@ -29,7 +29,7 @@ const WindowsAbuse: FC = () => { 2: Start the Relay Server The NTLM relay can be executed with Inveigh. - + 3: Coerce the Target Computer Several coercion methods are documented here:{' '} Windows Coerced Authentication Methods diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/General.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/General.tsx index 292931586..4f20a698b 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/General.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/General.tsx @@ -32,7 +32,7 @@ const General: FC = () => { - Click on Composition to view the domain controllers in the domain that do not require LDAP signing. + Click on Relay Targets to view the domain controllers in the domain that do not require LDAP signing. ); diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/LinuxAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/LinuxAbuse.tsx index 20eaa77a5..cc7557fc9 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/LinuxAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/LinuxAbuse.tsx @@ -23,19 +23,21 @@ const LinuxAbuse: FC = () => { <> Examples of this attack are detailed in the following blog posts: -
  • - - Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques - -
  • -
  • - - I’m bringing relaying back: A comprehensive guide on relaying anno 2022 - -
  • +
    diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/WindowsAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/WindowsAbuse.tsx index b6d61fe30..dbd5dbaff 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/WindowsAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/WindowsAbuse.tsx @@ -29,7 +29,7 @@ const WindowsAbuse: FC = () => { 2: Start the Relay Server The NTLM relay can be executed with Inveigh. - + 3: Coerce the Target Computer Several coercion methods are documented here:{' '} Windows Coerced Authentication Methods diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/General.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/General.tsx index f2955772f..d34f4bc07 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/General.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/General.tsx @@ -32,7 +32,7 @@ const General: FC = () => { - Click on Composition to view the domain controllers in the domain that do not require LDAPS channel + Click on Relay Targets to view the domain controllers in the domain that do not require LDAPS channel binding. diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/LinuxAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/LinuxAbuse.tsx index 42d0b42cd..7350f6edc 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/LinuxAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/LinuxAbuse.tsx @@ -23,19 +23,21 @@ const LinuxAbuse: FC = () => { <> Examples of this attack are detailed in the following blog posts: -
  • - - Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques - -
  • -
  • - - I’m bringing relaying back: A comprehensive guide on relaying anno 2022 - -
  • +
    diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/WindowsAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/WindowsAbuse.tsx index b6d61fe30..dbd5dbaff 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/WindowsAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/WindowsAbuse.tsx @@ -29,7 +29,7 @@ const WindowsAbuse: FC = () => { 2: Start the Relay Server The NTLM relay can be executed with Inveigh. - + 3: Coerce the Target Computer Several coercion methods are documented here:{' '} Windows Coerced Authentication Methods diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToSMB/General.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToSMB/General.tsx index 47f65a105..652237304 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToSMB/General.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToSMB/General.tsx @@ -29,7 +29,7 @@ const General: FC = () => { - Click on Composition to view victim computers with administrative rights on the target computer. + Click on Relay Targets to view victim computers with administrative rights on the target computer. ); diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToSMB/WindowsAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToSMB/WindowsAbuse.tsx index ec1f298bd..ec6686041 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToSMB/WindowsAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToSMB/WindowsAbuse.tsx @@ -30,7 +30,7 @@ const WindowsAbuse: FC = () => { 2: Start the Relay Server The NTLM relay can be executed with{' '} Inveigh. - + 3: Coerce the Target Computer Several coercion methods are documented here:{' '} Windows Coerced Authentication Methods