Skip to content

Commit 68435e6

Browse files
authored
relay usage notes
1 parent 989f271 commit 68435e6

1 file changed

Lines changed: 7 additions & 0 deletions

File tree

README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,13 @@ Impersonate a user account while running a PySQLRecon command with the `--impers
8686

8787
`--link` and `--impersonate` are incompatible.
8888

89+
### Usage with `ntlmrelayx`
90+
PySQLRecon can be used with `proxychains` to take advantage of relayed authentication targeting a `mssql://` service. Due to the way ntlmrelayx sessions work, the `--database` parameter will not be respected when running PySQLRecon (the relay session will always be connected to the master database). This can come into play especially when using SCCM modules, which require the site database to be sepecified. To fix this, first change the database context using the `query` module (this will persist across any subsequent PySQLRecon usage, with the same relay session). Example:
91+
```
92+
proxychains4 pysqlrecon -t <target> -d <DOMAIN> -u <username> -p FAKE query --query 'use new_db_name'
93+
```
94+
You can now run modules/queries that target resources within that specifc database, even without specifying `--database`, from the same `ntlmrelayx` session.
95+
8996
## Development
9097
pysqlrecon uses Poetry to manage dependencies. Install from source and setup for development with:
9198
```

0 commit comments

Comments
 (0)