What is an SMB relay attack
An SMB relay attack is similar to an LLMNR Poison in that it relies on a user connecting to a none existent network share only instead of stopping at just capturing the hash, the hash is relayed to another machine on the network and used to log in and then dump the local SAM file. When a user enters the IP address of a machine that does not exist on the network it sends out a multicast asking other computers if they know who has the IP address. Our listener replies to that request saying that we know the address and thus gets sent the requesting users hash to pass it on for them. The reason this works so frequently is that by default SMB does not perform Message signing on workstations. IE: It is not checking that the user requesting the share actually belongs on the domain. By default message signing is turned on for servers. By default it is either not turned on for workstations or is on but not required.
In order for the attack to work the user we must be a local admin on both machines. The machine requesting the file share and also the machine that we are relaying the hash to and logging in. I have gone ahead and made ecartman(What could possibly go wrong?) a member of the Administrators group on both machines
Configuring Responder
Scan for IP address with SMB Message Signing turned off
Setup the relay script
Capturing the hash, relaying it and dumping the local SAM file
Local SAM file of our target dumped :)
Relay Attack to Shell
Prevention
- Enable SMB Signing on all devices. This can be done via Group Policy
- Disable NTLM authentication on the network. Use Kerberos instead.
- Limit Domain Admins to specific task
I am always searching online for articles that can help me. There is obviously a lot to know about this. I think you made some good points in Features also. Keep working, great job, anticaptcha
ReplyDelete