5.1.2 - Relaying

Relaying

In a relaying attack, the target credentials are not captured directly, but they're forwarded to a local or remote service or an endpoint for authentication.

Two types based on authentication are:

  • NTLM Relaying

  • Kerberos Relaying

and the two most abused services for relaying are LDAP and AD CS.

In this HomeMade Labs is displayed the Net-NTLM relay attack tecnique:

Others techniques regarding priv esc are presente here here: Windows Privilege Escalation

PowerShell

PowerUp

  • Get services where the current user can write to its binary path or change arguments to the binary

  • Get services where the user's current configuration can be modified

  • Run all PrivEsc checks

PrivEsc

  • Run all PrivEsc checks

WinPeas

  • Run all PrivEsc checks

Last updated