NTLM Relay Attack
Intercepting & Relaying Authentication
Intercept NTLM authentication on the network and relay it to a different service to gain unauthorized access — the attacker never needs to crack the password.
Prerequisites:Network access on the same subnet as target hostsResponder for LLMNR/NBT-NS poisoningImpacket ntlmrelayx.py for relayingPetitPotam.py for authentication coercion
1
Launch Responder to Capture NTLM Auth
NTLM Relay Attack — Step 1/4
┌──(kali)-[~/tools]
└─$
Click or press Enter to skip
Step 1: Poison Name Resolution
Responder poisons LLMNR and NBT-NS name resolution. When a machine fails DNS lookup (e.g., typo in a UNC path), Responder answers "I'm that server, authenticate to me."
We are answering network name queries with "I'm the server you're looking for!" When victim machines believe us, they send their credentials. Think of it as pretending to be the receptionist to collect everyone's ID badges.
Detection Events
4688Responder/relay tool process creation
Attack Flow
Request
Response
Attack
Data