Nytro Posted July 20, 2013 Report Posted July 20, 2013 [h=1]Practical Exploitation - Effective NTLM / SMB Relaying[/h] Using ZackAttack, Responder and proxychains we can utilize relayed credentials more effectively than previously available.Here is a way to take this further: Quote