diff --git a/MultiRelay.md b/MultiRelay.md index 275df10..765bad8 100644 --- a/MultiRelay.md +++ b/MultiRelay.md @@ -30,7 +30,7 @@ Most of the time, MultiRelay can be run with the following options: ./tools/MultiRelay.py -t Target_IP -u Administrator DAaccount AnotherAdmin -MultiRelay comes with a set of 3 options: +MultiRelay comes with a set of 5 options: -p: Add an extra listening port for HTTP, WebDav, Proxy requests to relay. @@ -38,6 +38,11 @@ MultiRelay comes with a set of 3 options: -t: The target + -c: Single command to run (scripting) + + -d: Dump hashes (scripting) + + MultiRelay will start by fingerprinting your target and tell you if SMB Signing is mandatory and if so, will let you know that you should target another server. @@ -51,7 +56,9 @@ Another useful utility included in Responder's tools folder is RunFinger.py. Run RunFinger can dump this information in a grepable format by using the -g command line switch: -root@lgandx:~/Responder-2.3.3.0# ./tools/RunFinger.py -g -i 10.10.20.0/24 + +`root@lgandx:~/Responder-2.3.3.0# ./tools/RunFinger.py -g -i 10.10.20.0/24` + Wich will output something like: [SMB2]:['192.168.0.136', Os:'Windows 8.1/Server 2012R2', Build:'9600', Domain:'SMB1', Bootime: 'Last restart: 2021-04-20 12:37:56', Signing:'False', RDP:'False', SMB1:'Enabled'] @@ -60,7 +67,9 @@ Wich will output something like: [SMB2]:['192.168.0.253', Os:'Windows 10/Server 2016/2019 (check build)', Build:'17763', Domain:'SMB3', Bootime: 'Unknown', Signing:'True', RDP:'False', SMB1:'Disabled'] This utility is useful for mapping networks and to carefully select a target. -Running The Tool, The Common Scenario: + +### Running The Tool, The Common Scenario: + MultiRelay was built to work in conjunction with Responder.py, the common usage scenario is: * Set SMB and HTTP to Off in Responder.conf