Hijacking NTLM-powered Mobile Apps (Part 2 - Relaying with Metasploit)
Working on hacking a mobile app that uses NTLM to authenticate to a back-end web service? Make sure to check out Part 1 first. In this blog, we’ll assume we could not crack the password and instead need to relay the Challenge/Response to interact with the API.