Authentication Triggers and Forcing Techniques

circle-check

Some magic behind file naming

Understanding Authentication Triggers

Poisoning Attack Dependencies

Problem: Poisoning attacks are passive so they wait for natural authentication events that may never occur.

Solution: Active triggering, how? by forcing clients to attempt authentication to attacker-controlled services.

Attack Flow:

Trigger Deployment β†’ Client Interaction β†’ Authentication Attempt β†’ Poisoning Response β†’ Credential Capture

Requirements:

  1. Method to deliver the trigger payload or file like SMB shares, E-mail, and so on.

  2. User interaction like clicking on the file (maybe the user is just curious) or just the file appearing to a user in Windows file explorer.


Malicious .LNK & .URL Files

circle-exclamation

Malicious .LNK Files (Windows Shortcuts)

Malicious .URL Files (Internet Shortcuts)

circle-exclamation

Last updated

Was this helpful?