Using a SCF file to Gather Hashes Logo

Using a SCF file to Gather Hashes

0
Free
Updated 11 March 2025
Visit Website

Have you ever been on an internal network assessment and discovered an unauthenticated writable Windows-based file share? In addition to finding potentially sensitive information, you can abuse this to gather user hashes from users who are browsing the file share. In this attack, a special file with a SCF file extension is placed onto the file share. SCF files can control Windows Explorer, but in this case, we use one to elicit an unsuspecting user to submit their NTLMv1/2 hash to us, the attacker.

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

A technique for social engineering and untrusted command execution using ClickOnce technology

A scripting engine for interacting with GraphQL endpoints for pentesting purposes.

A tool for performing hash length extension attacks against multiple hashing algorithms.

Comprehensive host-survey tool for security checks in C#.

LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.

A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.

A wargaming network for penetration testers to practice their skills in a realistic environment.

Tool for exploiting Sixnet RTUs to gain root level access with little effort.

A collection of scripts for Turbo Intruder, a penetration testing tool

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved