npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
NTLM relay attacks intercept and forward NTLM authentication messages to gain unauthorized access to network resources. Attackers use tools like Responder for LLMNR/NBT-NS poisoning and ntlmrelayx for credential relay. This skill detects relay activity by querying Windows Security Event 4624 (successful logon) for type 3 network logons with NTLMSSP authentication, identifying mismatches between...
Detects NTLM relay attacks by analyzing Windows Event 4624 logon type 3 with NTLMSSP, IP-hostname mismatches, Responder signatures, SMB signing, and suspicious patterns across domains.
Detects NTLM relay attacks by analyzing Windows event 4624 for NTLMSSP auth, IP-hostname mismatches, Responder traffic signatures, SMB signing status, and cross-domain suspicious patterns. Useful for threat hunting in AD environments.
Detects NTLM relay attacks via Windows Security Event 4624 LogonType 3 correlation, IP-to-hostname mismatches, Responder/LLMNR poisoning, SMB/LDAP signing audits, and NTLMv2-to-v1 downgrades in Active Directory.
Share bugs, ideas, or general feedback.
NTLM relay attacks intercept and forward NTLM authentication messages to gain unauthorized access to network resources. Attackers use tools like Responder for LLMNR/NBT-NS poisoning and ntlmrelayx for credential relay. This skill detects relay activity by querying Windows Security Event 4624 (successful logon) for type 3 network logons with NTLMSSP authentication, identifying mismatches between WorkstationName and source IpAddress, detecting rapid multi-host authentication from single accounts, and auditing SMB signing configuration across domain hosts.
JSON report with suspected relay events, IP-hostname correlation anomalies, SMB signing audit results, and MITRE ATT&CK mapping to T1557.001.