You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks.md
These tools and techniques form a comprehensive set for conducting NTLM Relay attacks in various network environments.
117
117
118
+
### Abusing WSUS HTTP (8530) for NTLM Relay to LDAP/SMB/AD CS (ESC8)
119
+
120
+
WSUS clients authenticate to their update server using NTLM over HTTP (8530) or HTTPS (8531). When HTTP is enabled, periodic client check-ins can be coerced or intercepted on the local segment and relayed with ntlmrelayx to LDAP/LDAPS/SMB or AD CS HTTP endpoints (ESC8) without cracking any hashes. This blends into normal update traffic and frequently yields machine-account authentications (HOST$).
121
+
122
+
What to look for
123
+
- GPO/registry configuration under HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate and ...\WindowsUpdate\AU:
124
+
- WUServer (e.g., http://wsus.domain.local:8530)
125
+
- WUStatusServer (reporting URL)
126
+
- UseWUServer (1 = WSUS; 0 = Microsoft Update)
127
+
- DetectionFrequencyEnabled and DetectionFrequency (hours)
4) Trigger a client check-in or wait for schedule. From a client:
166
+
wuauclt.exe /detectnow
167
+
or use the Windows Update UI (Check for updates).
168
+
169
+
5) Use the authenticated SOCKS sessions (if -socks) or direct relay results for post-exploitation (LDAP changes, SMB ops, or AD CS certificate issuance for later authentication).
170
+
171
+
HTTPS constraint (8531)
172
+
- Passive interception of WSUS over HTTPS is ineffective unless clients trust your certificate. Without a trusted cert or other TLS break, the NTLM handshake can’t be harvested/relayed from WSUS HTTPS traffic.
173
+
174
+
Notes
175
+
- WSUS was announced deprecated but remains widely deployed; HTTP (8530) is still common in many environments.
176
+
- Useful helpers: wsusniff.py (observe HTTP WSUS check-ins), wsuspider.sh (enumerate WUServer/WUStatusServer from GPOs), NetExec reg-query at scale.
177
+
- Impacket restored HTTP listener support for ntlmrelayx in PR #2034 (originally added in PR #913).
178
+
118
179
### Force NTLM Logins
119
180
120
181
In Windows you **may be able to force some privileged accounts to authenticate to arbitrary machines**. Read the following page to learn how:
@@ -243,6 +304,14 @@ You now own **NT AUTHORITY\SYSTEM**.
-[MS-WSUSOD – Windows Server Update Services: Server-to-Client Protocol](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-wsusod/e00a5e81-c600-40d9-96b5-9cab78364416)
0 commit comments