hunting-for-ntlm-relay-attacks
SKILL.md
Hunting for NTLM Relay Attacks
Overview
NTLM relay attacks intercept and forward NTLM authentication messages to gain unauthorized access to network resources. Attackers use tools like Responder for LLMNR/NBT-NS poisoning and ntlmrelayx for credential relay. This skill detects relay activity by querying Windows Security Event 4624 (successful logon) for type 3 network logons with NTLMSSP authentication, identifying mismatches between WorkstationName and source IpAddress, detecting rapid multi-host authentication from single accounts, and auditing SMB signing configuration across domain hosts.
Prerequisites
- Python 3.9+ with Windows Event Log access or exported logs
- Windows Security audit logging enabled (Event ID 4624, 4625, 5145)
- Network access for SMB signing status checks
Key Detection Areas
- IP-hostname mismatch — WorkstationName in Event 4624 does not resolve to the source IpAddress
- NTLMSSP authentication — logon events using NTLM instead of Kerberos from domain-joined hosts
- Machine account relay — computer accounts (ending in $) authenticating from unexpected IPs
- Rapid authentication — single account authenticating to multiple hosts within seconds
- Named pipe access — Event 5145 showing access to Spoolss, lsarpc, netlogon, samr pipes
- SMB signing disabled — hosts not enforcing SMB signing, enabling relay attacks
Output
JSON report with suspected relay events, IP-hostname correlation anomalies, SMB signing audit results, and MITRE ATT&CK mapping to T1557.001.
Weekly Installs
1
Repository
mukul975/anthro…y-skillsGitHub Stars
1.3K
First Seen
2 days ago
Security Audits
Installed on
amp1
cline1
opencode1
cursor1
kimi-cli1
codex1