Source: CQURE Academy
Author: Daniel
URL: https://cqureacademy.com/blog/ntlm-relay-attacks-and-why-to-phase-out/
CQURE Hacks #68: NTLM Relay Attacks Explained and Why It’s Time to Phase Out NTLM
ONE SENTENCE SUMMARY:
Disabling NTLM authentication prevents relay attacks by forcing the use of Kerberos, enhancing security across Active Directory environments.
MAIN POINTS:
- Initially, NTLM authentication setting is disabled on the Domain Controller, allowing relay attacks.
- Attacker uses Responder and ntlmrelayx tools on Kali Linux to perform NTLM relay.
- Successful relay allows attacker access with credentials as CQURE\Administrator for further actions.
- Switching Group Policy to “Deny All” disables NTLM, blocking relay attacks.
- Kerberos authentication replaces NTLM, removing vulnerability to relay attacks.
- Demonstration highlights reduced NTLM attack surface when disabled.
- Phasing out NTLM requires identifying systems dependent on it.
- CQURE NTLM Phase-out Guide aids Active Directory NTLM replacement.
- New Advanced Windows Security Course 2026 registration is open.
- CQURE Hacks video demonstrates NTLM relay attack and mitigation steps.
TAKEAWAYS:
- Disabling NTLM eliminates relay attack vulnerability.
- Kerberos provides a more secure authentication method.
- Identify and audit NTLM-dependent systems before disabling.
- Proper planning is essential for a smooth NTLM phase-out.
- Educational resources and courses can aid in transitioning to secure methods.