Exploiting Microsoft Access "Linked Table" Feature for NTLM Forced Authentication Attacks

1 min read
Source: Check Point Research
Exploiting Microsoft Access "Linked Table" Feature for NTLM Forced Authentication Attacks
Photo: Check Point Research
TL;DR Summary

Researchers at Check Point have discovered a method to abuse the "Linked Table" feature in Microsoft Access, allowing attackers to perform NTLM forced authentication attacks. By tricking victims into opening a specially crafted .accdb or .mdb file, the attacker can leak the victim's NTLM tokens to an attacker-controlled server via any TCP port, bypassing firewall rules designed to block NTLM information stealing. NTLM is an outdated authentication protocol with known vulnerabilities, including brute-force attacks, pass-the-hash attacks, and relay attacks. Check Point recommends blocking outbound traffic through ports 139 and 445, disabling macros in MS-Access, and avoiding opening attachments from unsolicited sources to mitigate the risk.

Share this article

Reading Insights

Total Reads

0

Unique Readers

1

Time Saved

12 min

vs 13 min read

Condensed

96%

2,524105 words

Want the full story? Read the original article

Read on Check Point Research