This post explores uncommon NTLM relay attack techniques, including enumerating domain usernames via a non-admin SMB relay and relaying NTLM credentials to Microsoft SQL Server and LDAP.

23m read timeFrom securityboulevard.com
Post cover image
Table of contents
Table of contentsAttack 1: Enumerating Domain Usernames via a Non-Admin SMB RelayAttack 2: Relaying to Microsoft SQL ServerAttack 3: Relaying to LDAP and Configuring Resource-Based DelegationAttack 4: Shadow Credentials Attack with no Prior CredentialsAttack 5: Shadow Credentials Attack Using Prior Credentials

Sort: