LNK File Attacks

If we have access to a share, we can put there a malicious file. On the other end we can have responder. Once the file is opened we get the hash

Manual way

Step 1 - create a malicious LNK file

Create a file linking to our Kali Running responder

Put the shortcut in shared folder.

Step 2 - run the responder

  • sudo: Runs Responder with root privileges (required).

  • responder: The main script to run the Responder tool.

  • -I eth0: Specifies the network interface to listen on (e.g., eth0).

  • -v: Enables verbose output.

  • -d: Enables NBT-NS (NetBIOS Name Service) poisoning.

  • -P: Enables WPAD (Web Proxy Auto-Discovery Protocol) rogue proxy.

Make sure SMB is on

Step 3 Exploit

Run the shortcut file and we will have a hash.

We can crack it as well

Automated Way

Netexec can do it automatically. (slinky module)

It autocreates a LNK file.

Last updated