5.1.2 - Relaying
Relaying
In a relaying attack, the target credentials are not captured directly, but they're forwarded to a local or remote service or an endpoint for authentication.
Two types based on authentication are:
NTLM Relaying
Kerberos Relaying
and the two most abused services for relaying are LDAP and AD CS.
In this HomeMade Labs is displayed the Net-NTLM relay attack tecnique:
Others techniques regarding priv esc are presente here here: Windows Privilege Escalation
PowerShell
Get services with unquoted paths and a space in their name
Get-WmiObject -Class win32_service | select pathnameCheck permissions info regarding a service
sc.exe sdshow <service_name>
PowerUp
Get services with unquoted paths and a space in their name
Get services where the current user can write to its binary path or change arguments to the binary
Get services where the user's current configuration can be modified
Run all PrivEsc checks
PrivEsc
Run all PrivEsc checks
WinPeas
Run all PrivEsc checks
Last updated