SMB Relay
What is SMB relay?
SMB relay attack is just relaying those credentials you capture with responder like, in the LLMNR Poisoning but this time you authenticate with those in other machines.
Requirements
SMB Signing needs to be disabled on target
User must have elevated privileges in the machine, like local admin, domain administrator, member of, and the group etc.
What is SMB Signing?
SMB Signing verify the authenticity and origin of the SMB packets. Prevents SMB MiTM attacks effectively.
Check SMB Signing
You can use Crackmapexec and Nmap to scan the entire network for SMB signing to make much easier the job.
Crackmapexec
Use this command and see the results.
Nmap
Nmap haves a script to verify if SMB is signed or not. Use the following command and see the results.
How to perform the attack (Ipv4)
First, we need to configure the responder, just change SMB and HTTP to Off:
We do not want to respond to these protocols as we will be capturing the hash and relaying it to a different tool called ntlmrelayx.py from Impacket.
Starting responder
Later than, call ntlmrelayx.py:
SMB Relay using Ipv6
Last updated