LNK File Attacks
If we have access to a share, we can put there a malicious file. On the other end we can have responder. Once the file is opened we get the hash
Last updated
If we have access to a share, we can put there a malicious file. On the other end we can have responder. Once the file is opened we get the hash
Last updated
Put the shortcut in shared folder.
sudo
: Runs Responder with root privileges (required).
responder
: The main script to run the Responder tool.
-I eth0
: Specifies the network interface to listen on (e.g., eth0
).
-v
: Enables verbose output.
-d
: Enables NBT-NS (NetBIOS Name Service) poisoning.
-P
: Enables WPAD (Web Proxy Auto-Discovery Protocol) rogue proxy.
Run the shortcut file and we will have a hash.
Netexec can do it automatically. (slinky module)
It autocreates a LNK file.