Environment Setup#
Scope: 192.168.50.0/24
1. Domain Controller (DC)#
- Role: Active Directory Domain Controller
 - Domain: 
victim.org - IP Address: 
192.168.50.100 
2. MACHINEA#
- Domain Membership: 
victim.org - IP Address: 
192.168.50.3 - Users:
SyJoon→ Local AdministratorVICTIM\machinea→ Standard Domain User
 - Notes: Default Windows security features/policies intact (no modifications).
 
3. VICTIM1#
- Domain Membership: 
victim.org - IP Address: 
192.168.50.4 - Users:
victim1→ Local AdministratorVICTIM\machinea→ Local Administrator, member of groupRemote Management Users
 - Configuration:
- Inbound & outbound File and Printer Sharing (SMB) enabled
 - Windows Remote Management (HTTP-In) enabled
 - Default Windows security features/policies intact (no modifications).
 
 
4. ATTACKER (Kali Machine)#
- IP Address: 
192.168.50.2 
Scenario#
- A domain user 
VICTIM\machineaon MACHINEA mistypes a hostname or is tricked into accessing a non-existent network resource (e.g.,\\fakehost\share). - The attacker poisons LLMNR and NBT-NS, causing MACHINEA to authenticate to the attacker-controlled host.
 - This results in the capture of the user’s NTLMv2 hash.
 - The attacker then relays the captured credentials to VICTIM1 (via SMB relay), gaining access and dumping the SAM database.
 - With the dumped hashes, the attacker can perform offline password cracking or use Pass-the-Hash (PtH) to authenticate directly to VICTIM1.
 

Exploit chain#
Reconnaissance & Discovery#
Requirements: SMB signing disabled or have SMB signing enabled but not required
vulnerable
Initial Access#
A user may accidentally mistype a hostname while trying to access a network resource.
Alternatively, an attacker can stage a scenario — for example, impersonating a boss or department head and sending an email instructing an employee to connect to a shared resource “for review before the next meeting.”

Credential Access#
Attacker set up#

MACHINEA#
VICTIM\machinea read phising mail / mistype a hostname

Obtaining User Hashes#

If the captured hash corresponds to a weak password that exists in my wordlist, I can recover the plaintext password using tools such as Hashcat.

password
pth
Attack Rating#
- Technique: Easy / Not sophisticated
 - Requirements:
- LLMNR and NBT-NS enabled on the target machine
 - SMB accessible
 - WinRM enabled (if planning remote login)
 - Target user triggers a connection (e.g., mistyped hostname or network resource)
 - Target user has Administrator privileges (for post-exploitation activities)
 
 - Context:
- Attack is feasible and can succeed reliably
 - Can be performed stealthily without triggering antivirus alerts, though advanced system monitoring or intrusion detection may still detect the activity.
 
 - Real World:
- This scenario is likely to occur in real environments.
 
 
Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques introduces additional NTLM relay attack methods and variations beyond the standard scenarios.
References#
Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques