Skip to content

Commit cd8539d

Browse files
authored
Update spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks.md
1 parent 77ee190 commit cd8539d

1 file changed

Lines changed: 0 additions & 16 deletions

File tree

src/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks.md

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -292,22 +292,6 @@ PetitPotam.py -u user -p 'Passw0rd!' '<unicode-fqdn>' <victim-fqdn>
292292
krbrelayx.py -t smb://<victim-fqdn> -c whoami
293293
```
294294

295-
Impact and adaptations:
296-
297-
- **Pre-October 2025 SMB reflection**: this yielded **authenticated SYSTEM RCE** from a standard domain user by reflecting the victim's Kerberos auth back to its own SMB service.
298-
- **After CVE-2025-58726**: SMB added a **local-source-IP requirement** for loopback-auth sessions, which killed the remote SMB reflection path.
299-
- **LPE variant (CVE-2026-26128)**: if you already have code execution on the victim, use a **local forwarder / reverse SOCKS** so the final SMB session originates from a **local address** while still relaying the coerced AP-REQ. This converts the primitive into **SYSTEM local privilege escalation**.
300-
- **Other protocols still matter**: SMB-specific hardening does **not** kill Kerberos relay as a class. HTTP services without integrity / CBT remain strong targets, notably:
301-
- **AD CS Web Enrollment** (`http://<ca>/certsrv/certfnsh.asp`) to obtain a machine certificate
302-
- **SCCM AdminService** to perform privileged SCCM actions
303-
- likely any service that accepts Kerberos and does **not** enforce signing, EPA, or channel binding
304-
305-
Defensive notes:
306-
307-
- **Loopback SMB signing** is now the important default mitigation. Newer systems enforce signing for local SMB connections through `HKLM\System\CurrentControlSet\Services\LanmanServer\Parameters\RequireSecuritySignatureForLoopback`.
308-
- Treat **ADIDNS write access** as a relay primitive, not just a DNS issue.
309-
- For web targets, disable legacy HTTP enrollment when possible and enforce **EPA / CBT / signing** wherever the protocol supports it.
310-
311295
### Kerberos Relay Steps
312296

313297
- 3.1 **Recon the host**

0 commit comments

Comments
 (0)