Rapid7 Vulnerability & Exploit Database

HTTP Client MS Credential Relayer

Back to Search

HTTP Client MS Credential Relayer

Created
05/30/2018

Description

This module relays negotiated NTLM Credentials from an HTTP server to multiple protocols. Currently, this module supports relaying to SMB and HTTP. Complicated custom attacks requiring multiple requests that depend on each other can be written using the SYNC* options. For example, a CSRF-style attack might first set an HTTP_GET request with a unique SNYNCID and set an HTTP_POST request with a SYNCFILE, which contains logic to look through the database and parse out important values, such as the CSRF token or authentication cookies, setting these as configuration options, and finally create a web page with iframe elements pointing at the HTTP_GET and HTTP_POSTs.

Author(s)

  • Rich Lundeen <richard.lundeen@gmail.com>

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/server/http_ntlmrelay
msf auxiliary(http_ntlmrelay) > show actions
    ...actions...
msf auxiliary(http_ntlmrelay) > set ACTION < action-name >
msf auxiliary(http_ntlmrelay) > show options
    ...show and set options...
msf auxiliary(http_ntlmrelay) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;