Abusing NTLM Relay and Pass-The-Hash for Admin | by Julian Runnels | InfoSec Write-ups
I'm bringing relaying back: A comprehensive guide on relaying anno 2022 - TrustedSec
Abusing NTLM Relay and Pass-The-Hash for Admin | by Julian Runnels | InfoSec Write-ups
Remote NTLM relaying through meterpreter on Windows port 445 – DiabloHorn
Maximus on Twitter: "One other way to abuse null auth via PetitPotam to go from 0 creds to machine account: Relay DC$ Auth w/socks to any Win host with webclient running (+signing
mpgn on Twitter: "In case you want to see something cool about CrackMapExec, ntlmrelayx and Responder 😌😋 1⃣ Responder -I eth0 2⃣ https://t.co/uaVzXZLXfG -t <ip> -smb2support -socks 3⃣ proxychains crackmapexec smb <ip> -
Playing with Relayed Credentials – SecureAuth
I'm bringing relaying back: A comprehensive guide on relaying anno 2022 - TrustedSec