NTLM Relay Attacks
NTLM Relaying attacks
LDAP signing not required and LDAP channel binding disabled
During security assessment, sometimes we don't have any account to perform the audit. Therefore we can inject ourselves into the Active Directory by performing NTLM relaying attack. For this technique three requirements are needed:
Then we can use a tool to poison LLMNR , MDNS and NETBIOS requests on the network such as Responder and use ntlmrelayx to add our computer.
sudo ./Responder.py -I eth0 -wfrd -P -vsudo python ./ntlmrelayx.py -t ldaps://IP_DC --add-computerIt is required here to relay to LDAP over TLS because creating accounts is not allowed over an unencrypted connection.
SMB Signing Disabled and IPv4
If a machine has SMB signing : disabled , it is possible to use Responder with Multirelay.py script to perform an NTLMv2 hashes relay and get a shell access on the machine. Also called LLMNR/NBNS Poisoning
You might need to select a target with "-t"
The socks proxy can then be used with your Impacket tools or CrackMapExec
MITIGATIONS
Last updated