NTLM relay attacks are back from the dead

Source: Help Net Security

Author: Help Net Security

URL: https://www.helpnetsecurity.com/2025/07/04/ntlm-relay-attacks/

ONE SENTENCE SUMMARY: NTLM relay attacks remain prevalent, simple to execute, and effective at compromising Active Directory environments, requiring proactive mitigation strategies.

MAIN POINTS:

  1. NTLM relay attacks exploit authentication exchanges without needing password cracking or weak passwords.
  2. Relay attacks often combine with authentication coercion techniques like Printer Bug or PetitPotam.
  3. SMB servers, LDAP/LDAPS services, and ADCS web enrollment are primary NTLM relay targets.
  4. SMB relay attacks can grant attackers access to sensitive shares and enable lateral movement.
  5. LDAP relay attacks exploit unenforced LDAP signing and channel binding on domain controllers.
  6. ADCS web enrollment relay attacks enable attackers to impersonate victims using malicious certificates.
  7. Microsoft is introducing mitigations such as enforced SMB signing and LDAP sealing starting Windows Server 2025.
  8. NTLM is still widely used due to legacy software hard-coded to use it instead of Kerberos.
  9. Default configurations often leave older Windows environments highly vulnerable to relay attacks.
  10. Enforcing signing, channel binding, and regularly evaluating environments are critical for defense.

TAKEAWAYS:

  1. NTLM relay attacks remain a significant threat, commonly used in real-world attacks.
  2. Authentication coercion makes relay attacks viable anytime, not relying on victim-initiated authentication.
  3. Default configurations leave many organizations vulnerable; proactive changes are necessary.
  4. Upcoming Windows Server 2025 security defaults will help, but organizations shouldn’t wait to implement mitigations.
  5. Regular security evaluations, SMB/LDAP signing enforcement, and channel binding are essential defensive practices.