SMB Relay

Overview

Instead of cracking the captured hashes, we can instead relay those hashes to specific machines and potentially gain access.

However, SMB signing MUST BE DISABLED or NOT ENFORCED on target and the relayed credentials must be local administrator on the machine for any real value

Identify Hosts Without SMB Signing

nmap --script=smb2-security-mode.nse -p445 192.168.1.0/24

Desired Output

PORT    STATE SERVICE
445/tcp open  microsoft-ds

Host script results:
| smb2-security-mode:
|    3:1:1:
|_     Message signing enabled but not required

Edit Responder Configuration File

Responder + SMB Relay

Crack SAM Hashes

Mitigation

  • Enable SMB Signing on all devices

    • Pro: Completely stops the attacks

    • Con: Performance issues may arise with file copies

  • Disable NTLM authentication on the Network

    • Pros: Completely stops the attack

    • Con: If Kerberos stops working, Windows defaults back to NTLM

  • Limit Domain Admins for specific tasks

  • Local Administrator restrictions

Last updated

Was this helpful?