Skip to content

andreisss/NTLMv2-Hash-Leak-via-COM-Auto-Execution

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

NTLMv2-Hash-Leak-via-COM-Auto-Execution

Native auto-execution: Leverage login-time paths Windows trusts by default (Startup folder, Run-registry key).

Built-in COM objects: No exotic payloads or deprecated file types needed - just Shell.Application, Scripting.FileSystemObject and MSXML2.XMLHTTP and more COM objects.

Automatic NTLM auth: When your script points at a UNC share, Windows immediately tries to authenticate with NTLMv2.

The NTLM hash using native COM components and built-in Windows auto-execution logic. It is silent, reliable, and does not rely on deprecated or patched filetypes.

0click-ntlm.mp4

https://medium.com/@andreabocchetti88/ntlmv2-hash-leak-via-com-auto-execution-543919e577cb

About

NTLMv2 Hash Leak via COM + Auto-Execution

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors