Тёмный

Windows Domain - Attack & Defense: 02 NTLM Relay 

Volkis
Подписаться 454
Просмотров 7 тыс.
50% 1

Опубликовано:

 

2 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 17   
@foxxrider250r
@foxxrider250r 2 года назад
Is there a way to prevent external NTLM auth requests? Sorry if thats a dumb question, still learning about this
@Volkis
@Volkis 2 года назад
Hi! When you say external, do you mean out through the internet? The simplest answer is block outbound traffic that isn't needed. So, only allow DNS and HTTP(S) maybe. Another way to look at is to make sure there is nothing exposed that can receive the relayed authentication. NTLM itself is a vulnerable auth protocol, so you don't want to use it for anything you have accessible online.
@foxxrider250r
@foxxrider250r 2 года назад
@@Volkis hey Volkis! Thanks for the reply and enjoyed the video. I have disabled NTLM entirely on a clients DC , their only server, but am not sure if that will still allow requests to come through or not, I need to check the logs again. I was getting 30+ failed logins for a bunch of user names (some correct, some incorrect usernames), so I disabled it. Wondering if I need to enable SMB signing still, or honestly not even sure how the requests are being made 😟
@Volkis
@Volkis 2 года назад
@@foxxrider250r I'll need more context, so reach out through our website if you'd like. But, generally speaking if you disabled NTLM everywhere in the domain that will certainly stop NTLM Relay attacks. Technically, you don't need to enable signing then, but as a "just in case" you can still enable it. I'm not sure where the failed logins are coming from, but if you have NTLM disabled, Windows machines will use Kerberos (which should work unless they're using XP).
@Chris920809
@Chris920809 2 года назад
Awesome video, thanks for uploading this!
@nxu5107
@nxu5107 Год назад
Great Video. I couldn't get the crackmap smb command to work the way you demo it here. it just wouldn't list them. I don't know if I am missing something. Very useful video which introduced me to the tool and many thanks.
@Volkis
@Volkis Год назад
CME is always being updated so the format might be different now. Or it might be another problem. Hope you figure out the issue!
@jozefwoo8079
@jozefwoo8079 3 года назад
Thank you for sharing this! Very nice!
@mitch5222
@mitch5222 2 года назад
Is it possible to reuse AUTHENTICATE_MESSAGE (NTLM TlRM......) to authenticate new HTTP connection. For example if i put AUTHENTICATE_MESSAGE in http authorization header so i can skip first (NEGOTIATE_MESSAGE) and second (CHALLENGE_MESSAGE) pre authetication steps? Is CHALLENGE_MESSAGE only per one http session? Thanks
@Volkis
@Volkis 2 года назад
Theoretically, yes! NTLM is NTLM everywhere. In fact, a lot of exploits for the ADCS vulnerabilities were using SMB -> HTTP style relaying.
@mitch5222
@mitch5222 2 года назад
@@Volkis When i put NTLM AUTHENTICATE_MESSAGE in Authorization header and call IIS server it denies it.
@jafarali430
@jafarali430 3 года назад
Thanks for such amazing content. Can you please tell me how to establish connections in order to test the system?
@Volkis
@Volkis 3 года назад
There are lots of tools to check if Signing is enabled. We like to use CrackMapExec for this and a lot of other functionality.
@celtdawg01
@celtdawg01 3 года назад
Should we leave (if server agrees) and (if client agrees) disabled?
@Volkis
@Volkis 3 года назад
If you're setting "(always)", it will take precedent over "(if x agrees)", so it won't matter, but you can enable them too just in case.
@victoraguer1394
@victoraguer1394 Год назад
Thx a lot for that
@ap3660
@ap3660 2 года назад
keep teaching!!
Далее
Windows Domain - Attack & Defense: 03 Kerberoasting
8:57
Airpod Through Glass Trick! 😱 #shorts
00:19
Просмотров 1,7 млн
Living life on the edge 😳 #wrc
00:17
Просмотров 1,6 млн
🦊🔥
00:16
Просмотров 396 тыс.
CrowdStrike IT Outage Explained by a Windows Developer
13:40
PetitPotam NTLM Relay Attack | Threat SnapShot
6:29
Просмотров 4,9 тыс.
Microsoft Exchange Server 5.5 - Email like its 1998
24:06
When you Accidentally Compromise every CPU on Earth
15:59
Is your PC hacked? RAM Forensics with Volatility
14:29
Просмотров 913 тыс.
Airpod Through Glass Trick! 😱 #shorts
00:19
Просмотров 1,7 млн