Forced Coersion Attack
Files to trigger the attack:
1) .url File: A shortcut file that contains a URL pointing to a remote server.
2) .scf File: A Shell Command File configured to initiate a connection to a remote server.
3) .lnk File: A Windows shortcut file crafted to point to a remote server.
Tools:
Inveigh https://github.com/Kevin-Robertson/Inveigh
Responder
Invoke-ShareHunter https://github.com/Leo4j/Invoke-ShareHunter (Optional)
Permissions: Local Administrator (Inveigh), Write permissions over an SMB share
Steps
1) Load Inveigh and configure listener
2) Load Inveigh and set listener IP (Attack System)
3) Load Invoke-ShareHunter
4) Identify writeable shares within the domain
5) Write NTLM coercion files to identified writeable shares
6) Wait for user to browse to a share containing the crafted files and a NTLM hash is captured on the listener
Last updated