NTLM Relay
Last updated
Last updated
Imagine we have a user that is Administrator in other computer. We could use its power to extract the SAM hashes, even execute remote commands.
For example:
Sara Ardila is now Administrator over Carlos Villamizar (computer).
We need to create a file of targets (in this case PC-CARLOS):
And then, update the Responder.py configuration:
From here https://github.com/lgandx/Responder
Now, execute ntlmrelayx:
So, knowing that Sara is administrator over Carlos, we need to wait for a connection from Sara with a service or task. Using that poisoning on the network, we can trick the connection to travel across the network and end in our Responder, this will lead to take the privileges from the user Sara over Carlos and will do the magic using the ntlmrelayx.py program.
In Responder:
And ntlmrelayx:
And we are dumping SAM hashes, with these we can do Pass-The-Hash.
From here https://github.com/samratashok/nishang
Take the line 20:
Copy its content to the bottom of the file and change the values:
Now, serve that file and start a listener in the 4460 port to receive the PowerShell Reverse Shell:
Now, execute ntlmrelayx:
With this, we are reaching the file in our server and importing its content, as we have the last line uncommented, that line will be executed after being imported.
Now, start our Responder (remember, with SMB and HTTP Off
):
Wait for the connection from Sara to a invalid or down service/task/folder:
In our listener:
We are inside CarlosPC exploiting the privilege from Sara in CarlosPC :O