NTLMRelay
SMB signing is a security mechanism that allows digitally signing SMB packets to enforce their authenticity and integrity - the client/server knows that the incoming SMB packets they are receiving are coming from a trusted source and that they have not been tampered with while in transit, preventing man in the middle type attacks.
If SMB signing is disabled, packets can be intercepted/modified and/or relayed to another system.
Exploitation
For ntlmrelay to be successfull, three condition must be met :-
- SMB signing must be disabled on our target machine.
- Relayed user credential must be admin on the target machine.
We will use nmap to scan for host with SMB Signing disabled
.
We got two host 10.42.0.30
and 10.42.0.70
with smb signing disabled.
We will run responder
with HTTP
and SMB
set to OFF
.
at the same time, we will run ntlmrelayx.py
that will listen for ntlm traffics and relay them to our target system 10.42.0.30
and then execute “whoami /user” commands on the target.
Now we will go back to the victim machine and try to access file that does not exist.
Now let’s go back to our machine .
We have successfully executed command on our target system.