Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title/Project
RelayKing v1.0 (repository:
depthsecurity/RelayKing-Depth) is a comprehensive Active Directory NTLM relay detection + enumeration tool designed to identify actionable NTLM relay attack opportunities across common enterprise protocols and produce reports/outputs (including a curated target list) that can be fed into Impacket’sntlmrelayx.py.What RelayKing is for (offensive + defensive value)
RelayKing’s goal is ...
🔧 Technical Details
Relay opportunity discovery via protocol hardening checks: Enumerate enterprise services (SMB, HTTP/HTTPS, LDAP/LDAPS, MSSQL, RPC, etc.) and determine whether anti-relay controls are enforced. SMB checks include signing requirements (and are possible without auth per the tool). Web and directory protocols are evaluated for EPA/CBT (channel binding) and signing requirements; the tool notes that reliable HTTPS and LDAPS CBT checks typically require authenticated probing. A service is generally a better relay target when it accepts NTLM while not enforcing these protections.
Build end-to-end relay chains by combining “NTLM capture” with “relayable targets”: Identify coercion primitives (PetitPotam, PrinterBug, DFSCoerce; optionally detectable unauthenticated as described) that can force a victim machine/user to authenticate outward to an attacker-controlled listener. Then relay that inbound NTLM to a destination service previously verified as relayable (e.g., SMB wi...
🤖 Agent Actions
Summary:
Files Modified:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.