Prerequisites
Make sure RelayKing is installed before continuing.Choose your scan type
- Full domain audit
- Single target
- Unauthenticated sweep
- Lighter scan
The recommended approach for a full AD engagement. Requires low-privilege domain credentials and proper DNS configuration.This produces
relayking-scan.txt, relayking-scan.json, and relaytargets.txt (ready for ntlmrelayx.py).Full audit mode walkthrough
Verify DNS is working
RelayKing needs to resolve AD computer names. Either set
--dc-ip to point to your DC (which also serves DNS), or verify /etc/resolv.conf points to the domain DNS server.Run the audit
Execute with RelayKing will display the session file path so you can resume if interrupted.
--audit to enumerate all computers from Active Directory:Review relay paths
After scanning, RelayKing’s relay path analyzer automatically identifies and prioritizes viable attack paths. Check the output for CRITICAL and HIGH severity findings first.Relay paths are sorted by severity: CRITICAL → HIGH → MEDIUM → LOW
Always use
--proto-portscan with your scans. It performs a fast port scan before protocol checks, skipping closed ports and dramatically speeding up the scan. The default of 10 threads is already fast — use --proto-portscan rather than increasing thread count.What happens during a scan
- Target acquisition — RelayKing enumerates all AD computers via LDAP (
--audit), or parses your provided targets (CIDR, file, individual host). - Port scanning — With
--proto-portscan, only open ports are checked per protocol. - Protocol scanning — Each host is checked for relay vulnerabilities across selected protocols.
- Advanced detection — Ghost SPNs, NTLM reflection, WebDAV, coercion vulnerabilities, and CVEs are evaluated.
- Relay path analysis — Results are cross-referenced to identify and prioritize viable relay attack paths.
- Output — Findings are written in your chosen format(s).
Next steps
Command reference
Explore every available flag and option.
Audit mode guide
Deep dive into Active Directory audit mode.
Relay path analysis
Understand how relay paths are identified and prioritized.
Output formats
Configure output formats and relay list generation.
