LNK File Attacks
If we have access to a share, we can put there a malicious file. On the other end we can have responder. Once the file is opened we get the hash
Manual way
Step 1 - create a malicious LNK file
Create a file linking to our Kali Running responder

Put the shortcut in shared folder.

Step 2 - run the responder
sudo: Runs Responder with root privileges (required).responder: The main script to run the Responder tool.-I eth0: Specifies the network interface to listen on (e.g.,eth0).-v: Enables verbose output.-d: Enables NBT-NS (NetBIOS Name Service) poisoning.-P: Enables WPAD (Web Proxy Auto-Discovery Protocol) rogue proxy.

Step 3 Exploit
Run the shortcut file and we will have a hash.


Automated Way
Netexec can do it automatically. (slinky module)
It autocreates a LNK file.
Last updated