TT Malware Log

マルウェア / サイバー攻撃 / 解析技術 / 攻撃組織 に関する「個人」の調査・研究のログ

NTLMリレー攻撃 (まとめ)

vul.hatenadiary.com


【ニュース】

■2021年

◆KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS) (Microsoft, 2021/07/27)
[KB5005413:Active Directory 証明書サービス (AD CS) の NTLM リレー攻撃を緩和する]
https://support.microsoft.com/ja-jp/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
https://malware-log.hatenablog.com/entry/2021/07/27/000000_2


■2022年

◆新たなWindows NTLMリレー攻撃「DFSCoerce」発見 (マイナビニュース, 2022/06/23 09:51)
https://news.mynavi.jp/techplus/article/20220623-2375546/
https://malware-log.hatenablog.com/entry/2022/06/23/000000


■2023年

◆「Outlook」にゼロデイ脆弱性、MSが悪用確認スクリプトを用意 (Security NEXT, 2023/03/16)
https://www.security-next.com/144551
https://malware-log.hatenablog.com/entry/2023/03/16/000000_6

◆Windows 11 to require SMB signing to prevent NTLM relay attacks (BleepingComputer, 2023/06/02 02:22)
[Windows 11、NTLMリレー攻撃を防ぐためにSMB署名を必須に]
https://www.bleepingcomputer.com/news/security/windows-11-to-require-smb-signing-to-prevent-ntlm-relay-attacks/
https://malware-log.hatenablog.com/entry/2023/06/02/000000_5


■2024年

◆Exploit released for new Windows Server "WinReg" NTLM Relay attack (BleepingComputer, 2024/10/22 13:26)
[Windows Serverの新機能「WinReg」の悪用ツールが公開 NTLMリレー攻撃]
https://www.bleepingcomputer.com/news/security/exploit-released-for-new-windows-server-winreg-ntlm-relay-attack/
https://malware-log.hatenablog.com/entry/2024/10/22/000000_1


【ブログ】

■2023年

◆Outlook for Windowsに深刻な特権昇格の脆弱性「CVE-2023-23397」:対処すべき内容と注意点 (Trendmicro, 2023/03/22)
https://www.trendmicro.com/ja_jp/research/23/c/patch-cve-2023-23397-immediately-what-you-need-to-know-and-do.html
https://malware-log.hatenablog.com/entry/2023/03/22/000000_2


【検索】

■Google

google: NTLMリレー攻撃
google: NTLM Relay Attack

google:news: NTLMリレー攻撃
google:news: NTLM Relay Attack

google: site:virustotal.com NTLMリレー攻撃
google: site:virustotal.com NTLM Relay Attack

google: site:github.com NTLMリレー攻撃
google: site:github.com NTLM Relay Attack


■Bing

https://www.bing.com/search?q=NTLMリレー攻撃
https://www.bing.com/search?q=NTLM%20Relay%20Attack

https://www.bing.com/news/search?q=NTLMリレー攻撃
https://www.bing.com/news/search?q=NTLM%20Relay%20Attack


■Twitter

https://twitter.com/search?q=%23NTLMリレー攻撃
https://twitter.com/search?q=%23NTLM%20Relay%20Attack

https://twitter.com/hashtag/NTLMリレー攻撃
https://twitter.com/hashtag/NTLM%20Relay%20Attack


【関連まとめ記事】

全体まとめ

◆攻撃手法 (まとめ)
https://malware-log.hatenablog.com/entry/Attack_Method


Copyright (C) 谷川哲司 (Tetsuji Tanigawa) 1997 - 2023