LNK File Attacks
If we have access to a share, we can put there a malicious file. On the other end we can have responder. Once the file is opened we get the hash
Manual way
Step 1 - create a malicious LNK file
Create a file linking to our Kali Running responder


Step 2 - run the responder

Step 3 Exploit


Automated Way
Last updated