Closed Sockmower closed 2 months ago
My team is having a similar issue. Auth PetitPotam SMB v1-3 > PC$ is not getting caught. Responder does. Pcredz does not. Someone else recommended you need to declare your network interface with ntlmrelayx.
@Zamanry: Thanks; do you know the argument to do so so I can test that?
@Zamanry: Thanks; do you know the argument to do so so I can test that?
-ip #.#.#.# where #.#.#.# is your interface IP. We’ll test PetitPotam with that parameter this afternoon
Ah! I am already specifying -ip
. Thanks though
Same issue here, any advice?
I tried the -ip flag, never fixed it. I’ve encountered this issue at multiple clients now.
Hi, been doing some tests and wasn't able to replay the same behavior you are having.
There a couple parameters in ntlmrelayx to indicate in which interface (-ip
) and port (--http-port
in this scenario) to listen for connections
Just thinking out loud, and trying to better understand the scenario to analyze where could the issue be: Those HTTP requests are being done to the interface you configured there right? can you try configuring HTTP server in another port?
Hi,
We've been doing some tests with multiple impacket versions. It seems the issue was introduced between versions 0.9.24 and 0.10.0
Here are our results:
We coerce an authentication through EfsRpcEncryptFileSrv
with PetitPotam.py to a WebDaV server hosted on our machine on port 8080
:
We do receive HTTP authentications in ntlmrelay:
And we do receive the expected PROPFIND
handshake of WebDaV:
We coerce an authentication through EfsRpcEncryptFileSrv
with PetitPotam.py to a WebDaV server hosted on our machine on port 8080
:
In this case (ntlmrelay in impacket 0.10.0), we do not receive any HTTP authentication on ntlmrelay:
But we do receive the expected PROPFIND
handshake of WebDaV:
Therefore, we need to find in which commit the issue was introduced between:
265ce178fc1afcf942e2e1fabd7c8fab64e94893
(working)
and7a18ef5c8b06aac5e36334927789429777382928
(broken)Best regards, Podalirius
@p0dalirius this issue is related to ldap parameters handling in ldapattack.py. The webdav connection it's being handled ( as it's being shown in wireshark ). Can you please try with the master branch version? it seems this was fixed in https://github.com/fortra/impacket/commit/337d50d04e191c2b323ccf4877500fc487126dd1
@Sockmower sorry for the late response, can you provide the content of the target list file? can you also try with the master branch version, as many things has changed in ntlmrelayx since you reported this issue? Thanks!
Hey,
yesterday was doing some tests with different Impacket versions and finally found the commit that removed the log message (https://github.com/fortra/impacket/commit/c237962425efa0f7de270d607c5053b530c71fb0) related with the multirelay feature addition at #1297
It only affects WebDav requests. That is what was happening in your tests @p0dalirius. Were you doing webdav requests or HTTP GETs in yours, @Sockmower??
When processing an HTTP GET a message is always logged (unless in REDIRECT mode, but it wasn't the case in your tests) https://github.com/fortra/impacket/blob/829239e334fee62ace0988a0cb5284233d8ec3c4/impacket/examples/ntlmrelayx/servers/httprelayserver.py#L245-L250
But when processing WebDav, the PROPFIND method is not logging anything - at least until the connection is properly relayed - https://github.com/fortra/impacket/blob/829239e334fee62ace0988a0cb5284233d8ec3c4/impacket/examples/ntlmrelayx/servers/httprelayserver.py#L182-L189
A similar scenario, but for SMB relay, was solved in #1602. Will be submitting a new PR to handle these scenarios in all different relay servers; to give visibility on the received connections.
thank you!
I can jump in again! I was facing this issue with WebDAV coerced using PetitPotam code. Appreciate the help!
I'm trying to capture and relay authentication using ntlmrelayx.py; a Responder session in the same terminal window picks up the HTTP requests fine, but ntlmrelayx fails to produce any output even when debug mode is on. The client at 172.0.0.1 is repeatedly making HTTP requests to a resource on the attacker machine. The responder output is included below for reference:
Running ntlmrelayx in the same terminal, while the HTTP requests are still being made:
Why is it that Responder picks up these requests just fine but ntlmrelayx fails to do so?