Bypassing Windows authentication reflection mitigations for ...#2175
Open
carlospolop wants to merge 1 commit intomasterfrom
Open
Bypassing Windows authentication reflection mitigations for ...#2175carlospolop wants to merge 1 commit intomasterfrom
carlospolop wants to merge 1 commit intomasterfrom
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://www.synacktiv.com/en/publications/bypassing-windows-authentication-reflection-mitigations-for-system-shells-part-1.html Content Categories: Based on the analysis, this content was categorized under "Windows Hardening -> Windows Local Privilege Escalation (new page) and cross-link from NTLM / Places to steal NTLM creds / relay-related content; also potentially under Lateral Movement/NTLM Relay notes as a 'local reflection to SYSTEM via SMB arbitrary port' technique". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Post title: Bypassing Windows authentication reflection mitigations for SYSTEM shells - Part 1 (Synacktiv, 2026-04-27).
Core idea: Synacktiv revisits the Windows authentication reflection class (notably CVE-2025-33073) and shows Microsoft’s mitigation (blocking a specific SMB-client input pattern) didn’t remove the underlying risk. They then present a new, “trivial” local privilege escalation via NTLM loc...
🔧 Technical Details
Trick 1 — CMTI / CredMarshalTargetInfo “hostname smuggling” for reflection (CVE-2025-33073 class recap): If an authentication stack lets the caller append “additional target information” (base64) to a hostname, and LSASS strips that suffix before building NTLM/Kerberos blobs, an attacker can register/abuse DNS such that the unsanitized name resolves to an attacker IP while the sanitized name is used for the auth blob/SPN. This can yield NTLM local-auth exchanges (when sanitized target equals local machine name) or Kerberos
AP-REQmessages for a chosen SPN (e.g.,CIFS/HOST) delivered to attacker infrastructure, which can then be relayed to a service on the same machine to impersonate a coerced privileged client (oftenNT AUTHORITY\SYSTEM).Trick 2 — NTLM local reflection via SMB arbitrary-port + TCP-connection reuse (CVE-2026-24294): If the SMB client supports connecting to a share on an ...
🤖 Agent Actions
I’m mapping the repo first, then I’ll read the existing Windows/NTLM relay material before deciding whether this belongs in an existing page or needs a new one.
I found existing Windows LPE and NTLM-related content, including a
named-pipe-client-impersonationpage that already references reflection-style potatoes. Next I’m reading the most relevant pages in full to avoid duplicating what HackTricks already covers.The current LPE pages cover potatoes and named-pipe impersonation, but they don’t document this distinct SMB arbitrary-port plus connection-reuse reflection chain. I’m checking NTLM relay and credential-theft pages now so the placement decision is defensible and doesn’t duplicate adjacent content.
I’ve read more than five relevant pages now. The repo already has good coverage for generic NTLM, NTLM credential leakage, and potato-style impersonation, but not for this specific local reflection mechanism built on SMB arbitrary-port transport and TCP session reuse.
There’s already a short NTLM section mentioning the older CMTI reflection path, but not the new arbitrary-port SMB reuse variant. I’m reading that exact section now to choose between extending NTLM vs creating a focused Windows LPE page.
I’ve settled on a dedicated LPE page. The edits are going to be: add the new page with the technical chain and constraints, then add minimal links from the Windows LPE index and the existing NTLM reflection section so readers can find it without duplicating the writeup.
I’m editing now. The new page will stay focused on the technique itself, and the other edits will be kept to discovery links only so the technical content remains in one place.
The content is written. I’m doing a final pass on the rendered markdown targets now to catch bad relative links, awkward phrasing, or any accidental duplication before I stop.
Added a new HackTricks page for the technique at local-ntlm-reflection-via-smb-arbitrary-port.md. It documents the SMB arbitrary-port prerequisite, the TCP connection reuse/multiplexing condition, the same-share-path requirement, the
ntlmrelayx.pyrelay step, the Windows Server 2025 vs Windows 11 24H2 constraint, and technical detection/hardening notes. References were added at the end of that page.I also linked it from Windows Local Privilege Escalation README, from the existing NTLM reflection context in NTLM README, and added it to SUMMARY.md. I reviewed the diff and relative paths; no tests/build were run.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.