Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

NTLM Relay Attacks - An OPSEC-Conscious Approach to Port 445 Takeover

x33fcon via YouTube

Overview

Explore a conference talk from x33fcon that delves into a novel NTLM relay technique for hijacking port 445 with minimal operational security risks. Learn how to overcome the challenges of conducting NTLM relays from command-and-control infrastructure, particularly when dealing with Windows kernel limitations that prevent attackers from starting their own SMB listener. Discover a stealthy approach that avoids common operational security risks like loading suspicious drivers, system reboots, or LSASS tampering. Gain insights into the reverse engineering of Windows drivers, understand the underlying mechanics of this technique, and master the usage of a new automation tool that enables temporary SMB port control for relay attacks. Master advanced exploitation methods for relay attacks including SCCM site takeover and ADCS ESC8, while maintaining a low detection profile compared to traditional solutions.

Syllabus

16. Nick Powers: Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover

Taught by

x33fcon

Reviews

Start your review of NTLM Relay Attacks - An OPSEC-Conscious Approach to Port 445 Takeover

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.