Domain Domination With Windows Shortcuts
This article on malicious shortcut files and how they can be leveraged to capture NTLM hashes quietly and dominate a network or domain.
https://medium.com/cybersecpadawan/domain-domination-with-windows-shortcuts-6aab1d72b793
#shortcuts #lnk #abuse #windows
This article on malicious shortcut files and how they can be leveraged to capture NTLM hashes quietly and dominate a network or domain.
https://medium.com/cybersecpadawan/domain-domination-with-windows-shortcuts-6aab1d72b793
#shortcuts #lnk #abuse #windows
Medium
Domain Domination With Windows Shortcuts
Wait, what? How?
👍3
This media is not supported in your browser
VIEW IN TELEGRAM
EmbedExeLnk
Embedding an EXE inside a LNK with automatic execution
https://www.x86matthew.com/view_post?id=embed_exe_lnk
#embed #lnk #exe #cpp
Embedding an EXE inside a LNK with automatic execution
https://www.x86matthew.com/view_post?id=embed_exe_lnk
#embed #lnk #exe #cpp
👍3
Abusing LNK "Features" for Initial Access and Persistence
https://v3ded.github.io/redteam/abusing-lnk-features-for-initial-access-and-persistence
#windows #lnk #persistence #redteam
https://v3ded.github.io/redteam/abusing-lnk-features-for-initial-access-and-persistence
#windows #lnk #persistence #redteam
v3ded.github.io
Abusing LNK "Features" for Initial Access and Persistence
Preface Today we’ll talk about the misuse of .LNK trigger keys as a means of achieving initial access and persistence. I first heard about this topic myself ...