5.1.2 - Relaying

Relaying

In a relaying attack, the target credentials are not captured directly, but they're forwarded to a local or remote service or an endpoint for authentication.

Two types based on authentication are:

  • NTLM Relaying

  • Kerberos Relaying

and the two most abused services for relaying are LDAP and AD CS.

In this HomeMade Labs is displayed the Net-NTLM relay attack tecnique:

Others techniques regarding priv esc are presente here here: Windows Privilege Escalation

PowerShell

PowerUp

  • Get services with unquoted paths and a space in their name

    Get-ServiceUnquoted -Verbose
  • Get services where the current user can write to its binary path or change arguments to the binary

    Get-ModifiableServiceFile -Verbose
  • Get services where the user's current configuration can be modified

    Get-ModifiableService -Verbose
  • Run all PrivEsc checks

    Invoke-AllChecks

PrivEsc

  • Run all PrivEsc checks

    Invoke-PrivEscCheck

WinPeas

  • Run all PrivEsc checks

    winPEASx64.exe

Last updated