Flags
Comma-separated list of protocols to test. When omitted, a default set is used based on the active mode.Available protocols:
smb, http, https, ldap, ldaps, mssql, smtp, imap, imaps, rpc, winrm, winrmsPerform a fast TCP port scan before running protocol checks. Only protocols whose ports are found open are tested. This dramatically reduces scan time by avoiding connection attempts to closed ports.
Query the domain’s Group Policy Objects to detect a domain-wide NTLMv1 policy (
LmCompatibilityLevel). A permissive policy affects LDAP signing and channel binding relay logic — NTLMv1 responses can be relayed to hosts that would otherwise require signing.Check each host’s registry for its local
LmCompatibilityLevel value via the Remote Registry service. Provides per-host NTLMv1 status rather than the domain-wide GPO value.Test each target for coercion vulnerabilities such as PetitPotam, PrinterBug, and similar techniques that force a host to authenticate to an attacker-controlled listener. Requires
--coerce-target.A coercion path is only reported as a confirmed vulnerability when the attempt succeeds using --null-auth. With credentials, successful coercion is still noted but flagged differently.Coerce every AD computer account to authenticate to the listener specified by
--coerce-target. Requires --coerce-target, domain credentials (-u, -p, -d), and a reachable DC (--dc-ip). Cannot be combined with --audit.IP address of the listener that target hosts should authenticate to during coercion checks. Required when using
--coerce or --coerce-all. This is typically the IP of a machine running Responder or ntlmrelayx.Timeout in seconds for each coercion attempt. Increase this value on high-latency networks or through proxies.
Attempt null/anonymous authentication against targets. When enabled,
-u and -p are not required. Coercion findings (--coerce) are only classified as confirmed vulnerabilities when they succeed under null auth.Cannot be combined with --coerce-all.Skip the Ghost SPN relay check. Ghost SPN detection runs automatically in
--audit mode; use this flag to suppress it if it produces false positives or is not relevant to the assessment.Protocol reference
| Protocol | Default port | Notes |
|---|---|---|
smb | 445 | SMB signing and relay detection |
http | 80 | HTTP NTLM relay detection |
https | 443 | HTTPS NTLM relay detection |
ldap | 389 | LDAP signing and channel binding |
ldaps | 636 | LDAPS channel binding |
mssql | 1433 | MSSQL NTLM relay detection |
smtp | 25 | SMTP NTLM relay detection |
imap | 143 | IMAP NTLM relay detection |
imaps | 993 | IMAPS NTLM relay detection |
rpc | 135 | RPC endpoint mapper |
winrm | 5985 | WinRM (HTTP) relay detection |
winrms | 5986 | WinRM (HTTPS) relay detection |
Common protocol combinations
Recommended full scan (audit mode):http,https enables tier-0 HTTP relay path analysis on top of the default audit protocol set.
Quick SMB/LDAP sweep:
