SMBRelay

Brief

Instead of cracking hashes to find the clear password, you can relay those hashes to specific machines and potentially gain access.

Now, this attack requires two things :

  • SMB signing must be disabled on the target (NOTE: by default, SMB Signing is enabled on all DC servers)

  • Relayed user credentials must be admin on the machine (we can't relay the hash to the same machine since MS08-068, and the user we're relaying must have admin rights on the target machine if we want code execution otherwise user access if there's an open-share for example)

Attack

In order to relay hashes, we must have valid targets. Valid targets are, as predescribed, machines with SMB Signing disabled. So to get a list of those valide targets we can use for example CrackMapExec :

Now off to capture the hashes, but we first need to change a little configuration in the responder.conf file (/usr/share/responder/responder.conf) :

Interact with ntmlrelayx sessions

Proxychains

Retrieve hashes

Last updated

Was this helpful?