Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cheshireca7/smbAutoRelay
SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environments.
https://github.com/cheshireca7/smbAutoRelay
Last synced: 22 days ago
JSON representation
SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environments.
- Host: GitHub
- URL: https://github.com/cheshireca7/smbAutoRelay
- Owner: cheshireca7
- License: bsd-2-clause
- Created: 2020-08-31T09:52:56.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-12-20T09:48:35.000Z (almost 4 years ago)
- Last Synced: 2024-10-29T16:58:31.084Z (about 1 month ago)
- Language: Shell
- Homepage:
- Size: 1.15 MB
- Stars: 47
- Watchers: 3
- Forks: 11
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - cheshireca7/smbAutoRelay - SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environments. (Shell)
README
**DISCLAIMER**: I AM NOT RESPONSIBLE OF THE MISUSE OF THIS TOOL. YOU RUN IT AT YOUR OWN RISK. Before running it, make sure you are in a controlled environment, and where you are allowed to perform this kind of exercise. PLEASE BE KIND :)
# SMB AutoRelay
SMB AutoRelay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environments.![alt text](https://github.com/chesire-cat/smbAutoRelay/blob/master/images/helppanel.png?raw=true)
## Usage
Syntax: `./smbAutoRelay.sh -i -t [-q] [-d]`.
Example: `./smbAutoRelay.sh -i eth0 -t ./targets.txt`.
> Notice that the targets file should contain just the IP addresses of each target, one per line, to which you want to try the SMB/NTLM Relay technique.
Run `./smbAutoRelay.sh [-h]` to see other options.
##**Software which installs in the current directory [*needed to run properly*]**
- [responder](https://github.com/lgandx/Responder)
- [impacket](https://github.com/SecureAuthCorp/impacket)
**Software which installs through `apt`, if not installed [*needed to run properly*]**
- tmux
- rlwrap
- python
- python3
- netcat
- wget
- xterm
- net-tools
## TODOs
- [ ] Add the possibility to capture and crack the NetNTLM hashes.
- [x] Addapt it to use terminal profiles