Skip to content

Commit b172be3

Browse files
authored
Update README.md
1 parent c8e5904 commit b172be3

1 file changed

Lines changed: 11 additions & 3 deletions

File tree

README.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,19 @@
11
# KrbRelayEx
2-
![image](https://github.com/user-attachments/assets/35624ed8-9c84-455a-9458-7115b51c4bde)
2+
<img width="575" alt="image" src="https://github.com/user-attachments/assets/e922aeeb-d389-4667-81ac-515d99bbeda5" />
3+
4+
35

46
![Version](https://img.shields.io/badge/version-1.0-blue)
5-
Kerberos Relay and Forwarder for (Fake) SMB MiTM Server
7+
Kerberos Relay and Forwarder for (Fake) RPC/DCOM MiTM Server
68

79
---
8-
KrbRelayEx is a tool designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets. It listens for incoming SMB connections and forwards the AP-REQ to the target host, enabling access to SMB shares or HTTP ADCS (Active Directory Certificate Services) endpoints on behalf of the targeted identity.
10+
KrbRelayEx-RPC is a tool similar to my <a href=https://github.com/decoder-it/KrbRelayEx>KrbRelayEx</a> designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets. <br>
11+
This version implements a fake RPC/DCOM server:<br>
12+
- Listens for authenticated ISystemActivator requests and extracts the AP-REQ tickets
13+
- Extracts dynamic port bindings from EPMAPPER/OXID resolutions
14+
- Relay the AP-REQ to access SMB shares or HTTP ADCS (Active Directory Certificate Services) on behalf of the victim on the real destination host
15+
- Forwards the victim's requests dynamically and transparently to the real destination and port so the victim is unaware that their requests are being intercepted and relayed.
16+
917

1018
## Disclaimer
1119

0 commit comments

Comments
 (0)