Updated MultiRelay (markdown)

lgandx 2021-04-21 17:08:13 -03:00
commit 057e63ab6f

@ -30,7 +30,7 @@ Most of the time, MultiRelay can be run with the following options:
./tools/MultiRelay.py -t Target_IP -u Administrator DAaccount AnotherAdmin
MultiRelay comes with a set of 3 options:
MultiRelay comes with a set of 5 options:
-p: Add an extra listening port for HTTP, WebDav, Proxy requests to relay.
@ -38,6 +38,11 @@ MultiRelay comes with a set of 3 options:
-t: The target
-c: Single command to run (scripting)
-d: Dump hashes (scripting)
MultiRelay will start by fingerprinting your target and tell you if SMB Signing is mandatory and if so, will let you know that you should target another server.
@ -51,7 +56,9 @@ Another useful utility included in Responder's tools folder is RunFinger.py. Run
RunFinger can dump this information in a grepable format by using the -g command line switch:
root@lgandx:~/Responder-2.3.3.0# ./tools/RunFinger.py -g -i 10.10.20.0/24
`root@lgandx:~/Responder-2.3.3.0# ./tools/RunFinger.py -g -i 10.10.20.0/24`
Wich will output something like:
[SMB2]:['192.168.0.136', Os:'Windows 8.1/Server 2012R2', Build:'9600', Domain:'SMB1', Bootime: 'Last restart: 2021-04-20 12:37:56', Signing:'False', RDP:'False', SMB1:'Enabled']
@ -60,7 +67,9 @@ Wich will output something like:
[SMB2]:['192.168.0.253', Os:'Windows 10/Server 2016/2019 (check build)', Build:'17763', Domain:'SMB3', Bootime: 'Unknown', Signing:'True', RDP:'False', SMB1:'Disabled']
This utility is useful for mapping networks and to carefully select a target.
Running The Tool, The Common Scenario:
### Running The Tool, The Common Scenario:
MultiRelay was built to work in conjunction with Responder.py, the common usage scenario is:
* Set SMB and HTTP to Off in Responder.conf