SMB Relay
What is SMB Relay?
Instead of cracking hashes gathered from Responder, we can instead relay the hashes to specific machines and maybe gain access
Requirements
SMB signing must be disabled on the target
Relayed user credentials must be admin on machine
Attack Procedure
Configure Responder (/etc/responder/Responder.conf) to only capture SMB and HTTP requests but not responding to them.
Mitigation Strategies
Enable SMB Signing on all devices
Pro: Completely stops the attack
Con: Can cause performance issues with file copies
Disable NTLM authentication on network
Pro: Completely stops the attack
Con: If Kerberos stops working, Windows defaults back to NTLM
Account tiering:
Pro: Limits domain admins to specific tasks (only log onto servers with need for DA)
Con: Enforcing the policy may be difficult
Local admin restriction:
Pro: Can prevent a lot of lateral movement
Con: Potential increase in the amount of service desk tickets
Last updated