User-Interaction Attacks
Here we would talk about some nice-n-easy techniques which requires interaction with meatbags like million types of intercepting creds :3
Monitoring for Process Command Lines
There may be scheduled tasks or other processes being executed which pass credentials on the command line. We can look for process command lines using something like this script below. It captures process command lines every two seconds and compares the current state with the previous state, outputting any differences.
Then we are hosting script in out machine at looking at the magic
Malicious SCF file
An SCF file is a Windows Explorer shortcut used to execute commands. For intercepting hashes:
And then for our good-old-middleman Responder
Last updated