当前位置:网站首页>Office doc add in - Online CS
Office doc add in - Online CS
2022-07-06 06:36:00 【zxl2605】
principle
The remote malicious template with macros will be loaded directly for use .
- shortcoming
The network speed of the target host determines the speed of loading the remote template . It is possible that the file will be opened very slowly ( For example, put the remote template in github), The victim may force the file to close halfway through the opening word. - advantage
Because it is loaded remotely , So the killing free effect is very good . Basically will not be blocked by anti-virus software .
Realization
First step : Make a malicious template and ensure that it can go online
Here we use cs The macro Trojan horse For example .
Get malicious VB Open after code word, Right click in an empty area of the toolbar , Click Customize Ribbon
Check the development tool option .
At this point, the development tools column will appear
Click here Visual basic, Copy malicious code to project The designated location of is shown in the figure below
Then close the code box , Put this word Save the file as a dotm Template file
At this time, you can test whether the template can be launched , Right click the template file , Double clicking cannot open the template file , Double click on the template file to create a new file with this template by default , Bear in mind .
Click enable content to go online .
Testing is completed .
The second step : Making malicious macro templates for remote loading docx file
1. Upload malicious files to the server
First, upload the template file containing malicious code that has just been made to the server , Here the github To do this experiment , Click the malicious file uploaded in the figure below .
You will enter the following page
Copy this page's url
And in url Followed by ?raw=true, The final results are as follows , Save this line and you'll use it later .https://github.com/shanfenglan/test/blob/master/Doc1.dotm?raw=true
2. Load malicious files on the server
open word Double click any template to use , Then save everything in any path without changing .
Rename the file , Change it to zip ending .
Unzip it
Get into word In folder _rels, find settings.xml.rels file
Edit this file , Put its target Change the value of the attribute to the one above url, That is to say
https://github.com/shanfenglan/test/blob/master/Doc1.dotm?raw=true, Then save to exit .
Next, compress the file just extracted and generated , And change the name to suffix docx The file of .
result
Direct double click 1.docx file
It will look like this after opening. We don't care about him , Just click OK , Then click enable content .
Found that the Trojan is online
Then throw this file to vitrual total Check and kill the virus , It was found that only the anti-virus software of two companies thought it was a virus
So the experiment is over .
summary
as everyone knows ,docx File cannot execute macro code , So send docx It's easy for the other party to relax their vigilance when filing , So as to improve the success rate of attack .
边栏推荐
- CS-证书指纹修改
- 如何将flv文件转为mp4文件?一个简单的解决办法
- [no app push general test plan
- QT: the program input point xxxxx cannot be located in the dynamic link library.
- 关于新冠疫情,常用的英文单词、语句有哪些?
- [ 英語 ] 語法重塑 之 動詞分類 —— 英語兔學習筆記(2)
- Remember the implementation of a relatively complex addition, deletion and modification function based on jeecg-boot
- Day 246/300 ssh连接提示“REMOTE HOST IDENTIFICATION HAS CHANGED! ”
- Mise en œuvre d’une fonction complexe d’ajout, de suppression et de modification basée sur jeecg - boot
- MySQL is sorted alphabetically
猜你喜欢
[ 英语 ] 语法重塑 之 英语学习的核心框架 —— 英语兔学习笔记(1)
ECS accessKey key disclosure and utilization
Summary of leetcode's dynamic programming 4
Lecture 8: 1602 LCD (Guo Tianxiang)
红蓝对抗之流量加密(Openssl加密传输、MSF流量加密、CS修改profile进行流量加密)
LeetCode 731. My schedule II
How do programmers remember code and programming language?
在JEECG-boot代码生成的基础上修改list页面(结合自定义的组件)
MFC on the conversion and display of long string unsigned char and CString
University of Manchester | dda3c: collaborative distributed deep reinforcement learning in swarm agent systems
随机推荐
Simulation volume leetcode [general] 1296 Divide an array into a set of consecutive numbers
生物医学英文合同翻译,关于词汇翻译的特点
LeetCode 739. Daily temperature
Black cat takes you to learn UFS protocol Chapter 4: detailed explanation of UFS protocol stack
Biomedical localization translation services
Mise en œuvre d’une fonction complexe d’ajout, de suppression et de modification basée sur jeecg - boot
Qt:无法定位程序输入点XXXXX于动态链接库。
Delete the variables added to watch1 in keil MDK
端午节快乐Wish Dragon Boat Festival is happy
Difference between backtracking and recursion
Financial German translation, a professional translation company in Beijing
The internationalization of domestic games is inseparable from professional translation companies
Private cloud disk deployment
It is necessary to understand these characteristics in translating subtitles of film and television dramas
Black cat takes you to learn EMMC Protocol Part 10: EMMC read and write operation details (read & write)
CS通过(CDN+证书)powershell上线详细版
Set the print page style by modifying style
Simulation volume leetcode [general] 1219 Golden Miner
Esp32 esp-idf watchdog twdt
Making interactive page of "left tree and right table" based on jeecg-boot