How it works
All three payload types embed a UNC path pointing to your listener IP (\\<your_ip>\share\icon.ico). Windows resolves UNC paths automatically in several contexts:
.library-ms— Windows Library files. When a Library file references a remotesimpleLocationURL pointing to a UNC path, Windows Explorer contacts that path during folder enumeration and renders it as a library location. Authentication is triggered when the Library is loaded..scf— Shell Command Files. TheIconFiledirective in an SCF file is resolved by Explorer when the containing folder is opened. No double-click required — simply navigating to the folder triggers authentication..lnk— Windows Shortcut files. LNK files embed anIconPathand a network target. When Explorer renders the shortcut icon, it contacts the UNC path, triggering authentication.
Payload generation
The UI submits toPOST /api/masterbaiter/generate:
| Field | Required | Description |
|---|---|---|
types | Yes | Array of payload types to generate. Values: "library", "scf", "lnk". At least one required. |
file_name | No | Base filename without extension (default: payload). |
ip | Yes | Your listener IP address. Embedded in all UNC paths as \\<ip>\share\icon.ico. Auto-filled from the Network Info bar. |
icon_path | No | Icon path embedded in .lnk files (default: C:\Windows\System32\shell32.dll). |
zip | No | When true, all generated files are packaged into a single <file_name>.zip archive. Individual files are removed from recon/loads/ after zipping. |
Generated file formats
.library-ms
A Windows Library XML file with your listener IP embedded in both the iconReference and the simpleLocation URL:
.scf
A Shell Command File with the icon pointing to your listener:
.lnk
A binary Windows Shortcut file constructed in pure Python (no Windows dependency). The LNK header encodes the UNC target \\<ip>\share\icon.ico in both the ANSI (PathBuffer) and Unicode string fields so Explorer resolves it on any Windows version.
Output directory and file gallery
All generated files are written torecon/loads/. The UI fetches the current file list from GET /api/masterbaiter/files and displays it as a downloadable gallery. Each file entry shows the filename and file size.
Download individual files via:
os.path.basename to prevent path traversal.
Delete files from the gallery with:
Zip packaging
Enable the Zip toggle in the UI (or set"zip": true in the request) to package all generated files into a single archive named <file_name>.zip. Individual files are removed from recon/loads/ after being added to the zip. This is useful when dropping payloads via email or phishing where a single attachment is more practical.
Workflow
Start Responder
Go to LAYER2 → Responder and start Responder on the interface connected to the target network. Responder will capture the SMB authentication triggered by the payload files.
Configure MasterBaiter
Open VULNERABILITIES → MasterBaiter. Confirm your listener IP (auto-filled from Network Info). Enter a descriptive filename. Select the payload types to generate.
Generate payload files
Click Generate. Files are created in
recon/loads/ and appear in the file gallery below.Download the files
Click each file in the gallery to download it, or enable zip packaging before generating for a single archive.
Drop on an accessible share
Place the files in a writable SMB share on the target network — a share that target users are likely to browse. Common candidates:
\\fileserver\documents, \\fileserver\shared, \\fileserver\public. Alternatively, send the files via email or a phishing message as attachments.Wait for authentication events
When a victim’s machine browses the folder, Windows automatically contacts your listener IP and authenticates. Responder captures the NTLMv2 hash and stores it in the credentials database.
Output file location
recon/loads/ clean between engagements.