SMB Relay
Last updated
Was this helpful?
Last updated
Was this helpful?
I started the Responder in 1 tab with the following command:
In another tab I ran the ntlmrelayx.py script:
As Frank Castle was an administrator on both THEPUNISHER and SPIDERMAN machines, I logged into THEPUNISHER machine as Frank Castle user and tried to access the Kali IP
This gave me the following result:
You can see from the above screenshot that THEPUNISHER\Frank Castle attempt failed. This was because THEPUNISHER\Frank Castle we cannot relay the hashes back to the same machine. (Since ms08-068).
We successfully dumped the SAM hashes. We can not either take them offline to crack them or use PassTheHash technique.
To get a SMB shell, I kept the responder running and changed the ntlmrelayx command to the following:
The -i stands for interactive. Once the command was run, I accessed the Kali IP again from the Frank Castle machine.
It shows that an SMB client shell has been started on 127.0.0.1:11000. So I used netcat to connect to it on Kali machine.
The above screenshot shows that we have gained access to a shell and we can execute various commands as shown in the HELP.
With ntlmrelayx, we can also use the -c or -e flag to perform code execution or get meterpreter reverse shell access.