Brainstorming Post - Questions for windows NTLM vulnerability
by vvvalentinusss - Wednesday December 11, 2024 at 11:19 AM
#1
Hi talents.

News:https://www.tomshardware.com/tech-industry/cyber-security/zero-day-windows-ntlm-hash-vulnerability-gets-patched-by-third-party-credentials-can-be-hijacked-by-merely-viewing-a-malicious-file-in-file-explorer

Recently 0patch discovered a vuln about windows NTLM. 
According to the description that's very fancy, 0-click and user only need to browse the windows explorer then you are able to get their hash and break it. 

The scope also available from win7 till now the latest version.
Since the scope is really large, what i could think of is through SMB share 
i can't think of any type of file could do that like once i open the folder it will auto trigger and run something. 
Anyone let's brainstorm and think of it?
Reply
#2
This is interesting . But I think you missed the part of " malicious file being present in that folder "  or "viewing a file " blush_1


" The vulnerability allows an attacker to obtain user's NTLM credentials by simply having the user view a malicious file in Windows Explorer - e.g., by opening a shared folder or USB disk with such file, or viewing the Downloads folder where such file was previously automatically downloaded from attacker's web page. "

original article : https://blog.0patch.com/2024/12/url-file...osure.html



So what could be this thing  Hmmm ?

May be an .LNK file with UNC path pointing to a remote server . when a user opens this file it tries to connect to the remote server which triggers authentication / leaks NTLM

or Maybe something in the file metadata , while viewing explorer might access something from metadata that could trigger .


The catch  skull_1 : The blog also mentions this " or viewing the Downloads folder where such file was previously automatically downloaded from attacker's web page. "

automatically downloaded from attackers web page  susdog   ????


When you open a folder in file explorer it accesses the files , generates thumbnails ,  extracts metadata , displays icons . so if someone has to get NTLM by just opening  the folder where a malicious file is downloaded it has to be  because of one of these ways.

turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle 
I Love Data
[Image: Capture.png]
I am gonna be  a criminal , Hehehe
Reply
#3
(12-17-2024, 09:30 AM)Aanya Wrote: This is interesting . But I think you missed the part of " malicious file being present in that folder "  or "viewing a file " blush_1


" The vulnerability allows an attacker to obtain user's NTLM credentials by simply having the user view a malicious file in Windows Explorer - e.g., by opening a shared folder or USB disk with such file, or viewing the Downloads folder where such file was previously automatically downloaded from attacker's web page. "

original article : https://blog.0patch.com/2024/12/url-file...osure.html



So what could be this thing  Hmmm ?

May be an .LNK file with UNC path pointing to a remote server . when a user opens this file it tries to connect to the remote server which triggers authentication / leaks NTLM

or Maybe something in the file metadata , while viewing explorer might access something from metadata that could trigger .


The catch  skull_1 : The blog also mentions this " or viewing the Downloads folder where such file was previously automatically downloaded from attacker's web page. "

automatically downloaded from attackers web page  susdog   ????


When you open a folder in file explorer it accesses the files , generates thumbnails ,  extracts metadata , displays icons . so if someone has to get NTLM by just opening  the folder where a malicious file is downloaded it has to be  because of one of these ways.

turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle turtle 

it's a very good reply mate, insightful. 

Just my 2cents here, I have the same thought from the beginning about the points that oh "viewing" means simply looking but not accessing. If an LNK file that's way more simple to think about. Can't Imaginate when someone "viewing" a dir and see something within then the endpoint got compromised. I got a wrong direction that investigating if there's any way like shared network folder, SMB part.
Reply
#4
Were you able to figure it out ? I totally forgot about it lol
I Love Data
[Image: Capture.png]
I am gonna be  a criminal , Hehehe
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Exploiting Windows Services pwnengine 2 345 04-02-2025, 06:42 PM
Last Post: pwnengine
  [EXPLOIT] SSH || DOS/MITM Vulnerability Walescaffe 35 1,555 03-28-2025, 04:49 AM
Last Post: ae4D7T7G6tNg
  7-Zip Mark-of-the-Web Bypass Vulnerability [CVE-2025-0411] - POC thermos 11 1,374 03-27-2025, 10:22 AM
Last Post: eclipse360
  [CVE-2024-37383] Roundcube Mail Server Vulnerability PoC global2141 18 1,567 03-07-2025, 07:20 PM
Last Post: justALemon
  Windows TCP/IP - Remote Code Execution Checker and Denial of Service Exploit! Walescaffe 0 489 02-26-2025, 09:32 PM
Last Post: Walescaffe

Forum Jump:


 Users browsing this thread: