Client Side Attacks
URL Attack (Formerly SCF)
If there is a location a user is reading files from, like FTP or SMB, use a file like this to grab their hash with SMBServer.py or Responder once they click it. Then crack it with Hashcat.
Create it as a .txt and save as .url before sending or putting in location for user
HTA
HTML Applications that will get executed by mshta.exe if user is on IE or Edge (with Edge the user has more security notifications to click through
Host the file with a web server or upload it in a known place where the user will open
Macro
Create a macro in a Word doc that will auto-launch on opening to give a reverse shell
Can use the previous msfvenom command to copy a powershell payload or just use revshells.com
Split the powershell payload as you aren't allowed the full amount of characters on a single line
Then add the payload into the macro
Last updated