Autorelay – Automatically performs the SMB relay attack
Autorelay is a python based script that automatically performs the SMB relay attack either locally or on a remote device. This can be used during penetration testing to see if the servers are vulnerable to SMB attacks. This tool uses Responder to poison, Metasploit for HTTP NTLM relay (rather than just SMB relay), and Snarf for the MITM’ing.
When using locally, only requires an interface and an nmap XML file or a list of IPs on the target network to determine SMB hosts. while when used for SMB relaying on a jumpbox, requires the IP address of the jumpbox.
- sudo ./utorelay.py -x local-network.xml -i eth0
- sudo ./utorelay.py -l ips.txt -i eth0 -r 220.127.116.11 ** -l option needs some wee fixing **
You can download this tool over this link: https://github.com/DanMcInerney/