Abusing Microsoft Access "Linked Table" Feature to Perform NTLM Forced Authentication Attacks
Abusing Microsoft Access "Linked Table" Feature to Perform NTLM Forced Authentication Attacks
28 November 2023
An attacker can set up a server that they control, listening on port 80, and put its IP address in the above “server alias” field. Then they can send the database file, including the linked table, to the victim.