githubEdit

Forced Coersion Attack

Files to trigger the attack:

1) .url File: A shortcut file that contains a URL pointing to a remote server.

2) .scf File: A Shell Command File configured to initiate a connection to a remote server.

3) .lnk File: A Windows shortcut file crafted to point to a remote server.

Tools:

Inveigh https://github.com/Kevin-Robertson/Inveigh

Responder

Invoke-ShareHunter https://github.com/Leo4j/Invoke-ShareHunter (Optional)

Permissions: Local Administrator (Inveigh), Write permissions over an SMB share

Steps

1) Load Inveigh and configure listener

2) Load Inveigh and set listener IP (Attack System)

3) Load Invoke-ShareHunter

4) Identify writeable shares within the domain

5) Write NTLM coercion files to identified writeable shares

6) Wait for user to browse to a share containing the crafted files and a NTLM hash is captured on the listener

Last updated