Abuse Info
This section provides general guidance about abusing this edge. For detailed instructions, see references at the end of this article.Linux
- 
Start the Relay Server
The NTLM relay can be executed with ntlmrelayx.py. To relay to the enterprise CA and enroll a certificate, specify the HTTP(S) endpoint as the target and use the following arguments:
- 
Coerce the Target Computer
Several coercion methods are documented here: Windows Coerced Authentication Methods.
Examples of tools include:
To trigger WebClient coercion (instead of regular SMB coercion), the listener must use a WebDAV Connection String format: \\SERVER_NETBIOS@PORT/PATH/TO/FILE.
Windows
- Start the Relay Server The NTLM relay can be executed with Inveigh.
- 
Coerce the Target Computer
Several coercion methods are documented here: Windows Coerced Authentication Methods.
Examples of tools include:
To trigger WebClient coercion (instead of regular SMB coercion), the listener must use a WebDAV Connection String format: \\SERVER_NETBIOS@PORT/PATH/TO/FILE.
Opsec Considerations
Detection of NTLM Relay
NTLM relayed authentications can be detected by login events where the IP address does not match the computer’s actual IP address. This detection technique is described in the Detecting NTLM Relay Attacks blog post.Detection of Certificate Usage
Authentication using the obtained certificate is another detection opportunity. If Kerberos authentication is used, a domain controller will generate Windows Event ID 4768 (“A Kerberos authentication ticket (TGT) was requested”). This event will include the attacker’s IP address rather than the target computer’s IP address. Similarly, for Schannel authentication, Event ID 4624 will reveal the incorrect IP address. These detection techniques are described in detail under DETECT2 in the Certified Pre-Owned whitepaper.Edge Schema
Source:Authenticated Users, GroupDestination: Computer
Traversable: Yes
References
- Hackndo: NTLM relay
- Microsoft: NTLM Overview
- Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover
- Inveigh
- Windows Coerced Authentication Methods
- PetitPotam
- SpoolSample
- Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques
- printerbug.py
- I’m bringing relaying back: A comprehensive guide on relaying anno 2022
- ntlmrelayx.py
- 2020, 2023, and 2024 LDAP channel binding and LDAP signing requirements for Windows (KB4520412)
- Detecting NTLM Relay Attacks