Using a SCF file to Gather Hashes Logo

Using a SCF file to Gather Hashes

0
Free
Visit Website

Have you ever been on an internal network assessment and discovered an unauthenticated writable Windows-based file share? In addition to finding potentially sensitive information, you can abuse this to gather user hashes from users who are browsing the file share. In this attack, a special file with a SCF file extension is placed onto the file share. SCF files can control Windows Explorer, but in this case, we use one to elicit an unsuspecting user to submit their NTLMv1/2 hash to us, the attacker.

FEATURES

ALTERNATIVES

A cheat sheet providing examples of creating reverse shells for penetration testing.

A powerful XSS scanning and parameter analysis tool

An interactive multi-user web JS shell

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

A PowerShell toolkit for attacking Azure environments

AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.

A modular, menu-driven tool for building repeatable, time-delayed, distributed security events.

A front-end JavaScript toolkit for creating DNS rebinding attacks