Skip to content

Commit eb47d82

Browse files
docs: add port 135 for NTLM relay collection (#104)
1 parent 10c7909 commit eb47d82

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

docs/install-data-collector/install-sharphound/system-requirements.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ To collect Active Directory data with SharpHound and ingest it into BloodHound f
3737
* [LDAP channel signing](https://www.hub.trimarcsecurity.com/post/ldap-channel-binding-and-signing) is used for all queries.
3838
* \[Optional\] If performing privileged collection (see [Why perform privileged collection in SharpHound](/collect-data/enterprise-collection/privileged-collection))
3939
* SMB/RPC on 445/TCP to all in-scope domain-joined Windows systems
40+
* SMB/RPC on 135/TCP to all in-scope domain-joined Windows systems for NTLM relay-based collection
4041
* Approximately 60-100kB network bandwidth per collection to each in-scope domain-joined Windows system
4142
* \[Optional\] If performing DC Registry and CA Registry collection (see [DC Registry and CA Registry details](/collect-data/permissions))
4243
* SMB/RPC on 445/TCP to all DCs and domain-joined CAs
@@ -49,6 +50,7 @@ The SharpHound Enterprise service will run as a domain-joined account and will u
4950
* Granted "Log on as a service" User Rights Assignment on the SharpHound Enterprise server
5051
* \[Optional\] If performing privileged collection (see [Why perform privileged collection in SharpHound](/collect-data/enterprise-collection/privileged-collection))
5152
* Member of the local Administrators group on all in-scope domain-joined Windows systems
53+
* SharpHound's privileged collection may also use RPC over 135/TCP to support NTLM relay-based collection. When enabling privileged/NTLM relay collection, ensure any firewall rules and endpoint protections allow RPC endpoint mapper traffic (135/TCP) as required.
5254
* \[Optional\] If performing DC Registry and CA Registry collection (see [DC Registry and CA Registry details](/collect-data/permissions))
5355
* Member of the local Administrators group on all domain controllers and domain-joined certificate authorities
5456
* \[Optional\]: If Active Directory tombstoning is enabled

0 commit comments

Comments
 (0)