module
IconEnvironmentDataBlock - Windows LNK File Special UNC Path NTLM Leak
| Disclosed |
|---|
| May 16, 2025 |
Disclosed
May 16, 2025
Description
This module creates a malicious Windows shortcut (LNK) file that
specifies a special UNC path in IconEnvironmentDataBlock of Shell Link (.LNK)
that can trigger an authentication attempt to a remote server. This can be used
to harvest NTLM authentication credentials.
When a victim browse to the location of the LNK file, it will attempt to
connect to the the specified UNC path, resulting in an SMB connection that
can be captured to harvest credentials.
specifies a special UNC path in IconEnvironmentDataBlock of Shell Link (.LNK)
that can trigger an authentication attempt to a remote server. This can be used
to harvest NTLM authentication credentials.
When a victim browse to the location of the LNK file, it will attempt to
connect to the the specified UNC path, resulting in an SMB connection that
can be captured to harvest credentials.
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.