NTLM Relay
Generate relay list with CME and enumerate local admins when relaying:
Relay & catch hashes (via multi-relay):
The easier way though is to use the combination of -of/--output-file hashes.txt -ntlmchallenge 1122334455667788
options to save the hash with a predefined challenge to a file while relaying.
Relay NTLM2 responses obtained from Responder's proxy authentication to LDAP(S) (Responder's HTTP must be Off
):
CVE-2019-1040-scanner
Relaying on Windows
meterpreter + SharpRelay
Divert incoming SMB traffic from Victim to Attacker's local 445 port through an elevated meterpreter session and relay it to Target via MSF SOCKS server.
1. Add a static route to the Target through the 1st meterpreter session:
2. Start MSF SOCKS server:
3. Forward a reverse port 8445 on Victim to local port 445 on Attacker and start diverting incoming SMB traffic on Victim to Victim's local 8445 port:
4. Relay the diverted traffic to Target through SOCKS:
When ran once, the driver must be unloaded or the host rebooted before trying again. The fake service can be deleted with a PowerShell command:
beacon + PortBender
Set SOCKS server & port forwarding, upload WinDivert driver and configure redirection with PortBender:
Relay the planet:
Stop PortBender:
Last updated