Skip to content

Commit 75d0091

Browse files
Create article for SMB and stub for SMB relay attack
1 parent 2c4c675 commit 75d0091

File tree

5 files changed

+418
-1
lines changed

5 files changed

+418
-1
lines changed
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
title: Active Directory
3+
description: Active Directory
4+
categories: [Active Directory]
5+
tags: [Active Direcotory, Initial Access]
6+
weight: 2
7+
---
8+
9+
Active Directory
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
title: Active Directory Initial Access
3+
description: Enumeration
4+
categories: [Active Directory]
5+
tags: [Active Direcotory, Initial Access]
6+
weight: 2
7+
---
8+
9+
Initial Access on Microsoft Active Directory domain involves finding a first set of credential or finding access to the first service within an Active Directory network.
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
title: SMB Relay Attack
3+
description: SMB Relay Attack
4+
categories: [Active Directory]
5+
tags: [Active Direcotory, Initial Access, SMB, NTLM Authentication]
6+
weight: 2
7+
---
8+
9+
{{% alert title="Note" %}}
10+
This article is under construction. Information presented is not complete.
11+
{{% /alert %}}
12+
13+
SMB still supports NTLM authentication. The authentication flow goes as follows:
14+
1. Client calculates NTLM hash from the user's password and sends the username to the server.
15+
2. Server returns a random number called *nounce* as a **challenge**.
16+
3. Client completes the challenge by encrypting the nounce using the NTLM hash and sending the **response** to the server.
17+
4. If not part of an AD domain, the server encrypts the nounce itself and compare it to the ciphertext supplied by the client. If part of the AD domain, the server sends the client response to the **Domain Controller**, who does the comparison and tells the server if the response match or not.
18+
5. If there is a match, the client is successfully authenticated.
19+
20+
This authentication follow is suspetible to a **Man-in-the-Middle** attack called SMB relay. The flow of the attack goes as follows:
21+
1. Client initates connection to an **attacker controlled relay**.
22+
2. Attacker relay connects to target server, relay client's username to target
23+
3. Server responds the attacker relay with **NTLM challenge**.
24+
4. Attacker relays the **NTLM challenge** to the client.
25+
5. Client completes the challenges, sends attacker relay the **NTLM response**.
26+
6. Attacker relays client's **NTLM response** to the target server.
27+
7. Target server checks the response. If it's correct, access is granted to attacker relay.
28+
29+
TODO: Create Dedicated article for SMB relay attack

content/en/docs/services/nfs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ weight: 2
1212
- Listening port: **111 TCP/UDP**, **2049 TCP/UDP**
1313
- OS: Unix-Like
1414

15-
Network File System (NFS) is developed by Sun Microsystems in 1984, allowing a user to access files over the network as much like local storage. It builds on the **Open Network Computing Remote Procedure Call (ONC-RPC/SUN-RPC)** that listens on port 111 of both UDP and TCP.
15+
**Network File System (NFS)** is developed by Sun Microsystems in 1984, allowing a user to access files over the network as much like local storage. It builds on the **Open Network Computing Remote Procedure Call (ONC-RPC/SUN-RPC)** that listens on port 111 of both UDP and TCP.
1616

1717
NFS versions:
1818
- NFSv2: Released in March 1989, Operates entirely via UDP

0 commit comments

Comments
 (0)