


Search (advanced search) | ||||
Use this Search form before posting, asking or make a new thread.
|
01-13-2023, 02:13 AM
(This post was last modified: 01-13-2023 02:14 AM by mindpower.)
Post: #1
|
|||
|
|||
[F4LT] Red Team: Weaponizing Windows Shortcut (lnk) file Hands-on
Red Team: Weaponizing Windows Shortcut (lnk) file Hands-on
Modern techniques to weaponizing windows shortcut (lnk) file for red team/penetration tester/ethical hacker New Rating: 0.0 out of 5 (0 ratings) 377 students 35min of on-demand video Description Windows shortcut (LNK) files are a type of file that contain a reference to another file or program on a computer. They are commonly used to create shortcuts to frequently used programs or files on the desktop or in the Start menu. Cyber attackers and advanced persistent threat (APT) groups have been known to abuse LNK files as a means of gaining initial access to a system and spreading ransomware. One common technique is to send a malicious LNK file as an attachment in a phishing email. When the recipient clicks on the LNK file, it can execute a malicious script or program that installs the ransomware on the victim's computer. https://www.udemy.com/course/red-team-weaponizing-windows-shortcut-lnk-file/ Enjoy! |
|||