NTLM Relay

Generate relay list with CME and enumerate local admins when relaying:

Relay & catch hashes (via multi-relay):

The easier way though is to use the combination of -of/--output-file hashes.txt -ntlmchallenge 1122334455667788 options to save the hash with a predefined challenge to a file while relaying.

Relay NTLM2 responses obtained from Responder's proxy authentication to LDAP(S) (Responder's HTTP must be Off):

Relaying on Windows

meterpreter + SharpRelay

Divert incoming SMB traffic from Victim to Attacker's local 445 port through an elevated meterpreter session and relay it to Target via MSF SOCKS server.

1. Add a static route to the Target through the 1st meterpreter session:

2. Start MSF SOCKS server:

3. Forward a reverse port 8445 on Victim to local port 445 on Attacker and start diverting incoming SMB traffic on Victim to Victim's local 8445 port:

4. Relay the diverted traffic to Target through SOCKS:

beacon + PortBender

Set SOCKS server & port forwarding, upload WinDivert driver and configure redirection with PortBender:

Relay the planet:

Stop PortBender:

gost (GO Simple Tunnel)

CVE-2019-1040

CVE-2025-33073

Last updated