NTLM Relay Attacks

Understanding NTLM Relay

Core Concept

Instead of cracking the captured hashes by responder we can use these hashes to gain access to another machine.

Intercept NTLM authentication attempts (see Authentication Triggers and Forcing Techniques) and relay them to target systems without needing to crack password hashes.

Attack Flow:

Victim β†’ Attacker (Relay Server) β†’ Target System
  • Victim initiates NTLM authentication to attacker

  • Attacker forwards authentication to legitimate target

  • Target grants access based on victim's credentials

  • Attacker gains access as the victim

Requirements:

  • Target systems without SMB signing being enabled or enabled but not enforced (By default, disabled on the normal workstations and enforced on the server)

  • Victim authentication attempts either natural or forced

Relay type
Requirements

SMB to SMB

A domain user that is a local admin on the machine we are relaying the hash to

SMB to LDAP

LDAP server does not require signing (disabled or not enforced)


SMB Relay Attacks

Classic SMB to SMB Relay

Why? Relay SMB authentication between different SMB services for lateral movement.


Cross-Protocol Relay Attacks

SMB to LDAP Relay

Why? Relay SMB authentication to domain controllers for Active Directory privilege escalation.

LDAP Privilege Escalation

LDAPS (Secure LDAP) Relay

Requirements: Domain controller accessible, victim with domain privileges

Attack Value: Domain admin rights, DCSync capabilities, computer account creation


Advanced Relay Techniques

IPv6 + NTLM Relay Combination

Purpose: Combine IPv6 attacks with NTLM relay for enhanced targeting and stealth.

mitm6 + ntlmrelayx Integration

Requirements: IPv6 enabled in target environment

Attack Value: More reliable targeting, DNS manipulation, stealth

Multi-Protocol Relay Chains

Purpose: Chain multiple relay operations across different protocols for complex attack paths.

Last updated

Was this helpful?