Introducing RelayKing – Relay to Royalty #1834
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What the post is about
The post introduces RelayKing, a Python tool to inventory, categorize, and report NTLM relay/reflection/coercion paths across an Active Directory (AD) environment, with an emphasis on solving the detection + reporting gap rather than replacing exploitation frameworks like Impacket’s ntlmrelayx.py, Responder, or mitm6.
Tool + links (as provided)
- RelayKing (Depth Security): https://github.com/depthsec...
🔧 Technical Details
Trick 1 — Domain-wide relay surface mapping (AD → DNS → port presence → per-protocol enforcement checks): Enumerate all enabled AD computer objects and FQDNs, then drop non-resolving hosts via fast multi-threaded DNS checks. Optionally port-scan only the default ports for selected protocols (e.g., 80/443/445/389/636/1433) so the scanner tests only live/listening services. For each confirmed service, determine relay viability by testing signing requirements (e.g., SMB/LDAP) and EPA/CBT requirements on TLS services (e.g., HTTPS/LDAPS). Export results in machine-readable formats and generate an ntlmrelayx-ready relay target list that includes correct URI schemes and (for HTTP/HTTPS) the discovered vulnerable URL paths.
Trick 2 — Correct mental model for why signing blocks relays: Protocol signing relies on a session key derived from the authenticated principal’s NT hash. In NTLM relay you only forward Net-NTLMv1/v2 challenge-response, not the NT hash, ...
🤖 Agent Actions
Summary:
Tests:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.