HTB Media — WMP NTLM leak → NTFS junction to webroot RCE → F...#1387
Merged
carlospolop merged 7 commits intomasterfrom Sep 30, 2025
Conversation
…ot RCE → ... - Remove searchindex.js (auto-generated file)
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://0xdf.gitlab.io/2025/09/04/htb-media.html Content Categories: Based on the analysis, this content was categorized under "Phishing Methodology/Phishing Files & Documents (add: WMP .ASX/.WAX NTLM leak) and cross-link from Windows Privilege Escalation (SeImpersonate/Potato family) and a Windows NTFS Reparse Points/Junctions page under Generic Hacking or Web File Upload Attacks". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
710e03a to
4966f6d
Compare
Removed outdated references related to NTLM vulnerabilities and tools.
Collaborator
Author
|
merge |
4b54ccf to
74cc86a
Compare
…unction_to_webr_20250905_012055
…br_20250905_012055' of github.com:HackTricks-wiki/hacktricks into update_HTB__Media___WMP_NTLM_leak___NTFS_junction_to_webr_20250905_012055
Collaborator
Author
|
merge |
88a07c5 to
73b307c
Compare
…unction_to_webr_20250905_012055
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Target/context
Windows host (RDP rdp-ntlm-info Product_Version 10.0.20348) exposing TCP 22/80/3389. Service banners: OpenSSH for_Windows_9.5 on 22; Apache 2.4.56 (Win64) OpenSSL/1.1.1t PHP/8.1.17 on 80; self-signed RDP cert. The website (C:\xampp\htdocs) offers a video upload form advertised as Windows Media Player compatible.
How the upload workflow works
The upload handler is in /index.php and writes user files under C:\Windows\Tasks\Uploads<md5>, appending a li...
🔧 Technical Details
NTLM coercion via Windows Media Player playlists: A .asx/.wax playlist referencing a UNC path (file://ATTACKER\share\x.mp3) causes WMP to access SMB and perform NTLM authentication, leaking Net‑NTLMv2. Capture with Responder and crack with hashcat (-m 5600). This works when targets preview or auto-open user uploads.
NTFS junction for arbitrary write redirection: When uploads are stored under a predictable subdirectory (e.g., md5 of user fields), delete that directory and create a junction to a sensitive target (e.g., webroot). Re-uploading writes attacker-controlled files into the target path, enabling code execution if the target executes server-side scripts (mklink /J <upload_md5> → C:\xampp\htdocs).
Restoring dropped token privileges (FullPowers): Some services run with restricted tokens lacking SeImpersonatePrivilege. FullPowers registers and runs a scheduled task that spawns a child with the account’s default full privileges, restoring SeI...
🤖 Agent Actions
I analyzed the blog and updated HackTricks with the technical techniques that were not yet fully covered:
What I added/updated
Why these changes
References added
If you want further cross-linking (e.g., from the general NTLM README), I can add that, but the current placements already provide clear navigation paths from both phishing and NTLM pages and from web file uploads into Windows-specific reparse point abuse.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup