Autorelay – Automatically performs the SMB relay attack

Autorelay is a python based script that automatically performs the SMB relay attack either locally or on a remote device. This can be used during penetration testing to see if the servers are vulnerable to SMB attacks. This tool uses Responder to poison, Metasploit for HTTP NTLM relay (rather than just SMB relay), and Snarf for the MITM’ing.

When using locally, only requires an interface and an nmap XML file or a list of IPs on the target network to determine SMB hosts. while when used for SMB relaying on a jumpbox, requires the IP address of the jumpbox.

Local use:
  • sudo ./utorelay.py -x local-network.xml -i eth0
Remote use:
  • sudo ./utorelay.py -l ips.txt -i eth0 -r 95.34.53.243 ** -l option needs some wee fixing **
Autorelay – Automatically performs the SMB relay attack

Autorelay – Automatically performs the SMB relay attack

You can download this tool over this link: https://github.com/DanMcInerney/

Share