MITRE ATT&CK ID: T1557.001

image.png

1- Understanding NTLM Authentication


2- Steps of an NTLM Relay Attack

a. Interception

b. Relaying

c. Access


3- Key Tools for NTLM Relay