当前位置:网站首页>Office doc add in - Online CS
Office doc add in - Online CS
2022-07-06 06:36:00 【zxl2605】
principle
The remote malicious template with macros will be loaded directly for use .
- shortcoming
The network speed of the target host determines the speed of loading the remote template . It is possible that the file will be opened very slowly ( For example, put the remote template in github), The victim may force the file to close halfway through the opening word. - advantage
Because it is loaded remotely , So the killing free effect is very good . Basically will not be blocked by anti-virus software .
Realization
First step : Make a malicious template and ensure that it can go online
Here we use cs The macro Trojan horse For example .
Get malicious VB Open after code word, Right click in an empty area of the toolbar , Click Customize Ribbon
Check the development tool option .
At this point, the development tools column will appear
Click here Visual basic, Copy malicious code to project The designated location of is shown in the figure below
Then close the code box , Put this word Save the file as a dotm Template file
At this time, you can test whether the template can be launched , Right click the template file , Double clicking cannot open the template file , Double click on the template file to create a new file with this template by default , Bear in mind .
Click enable content to go online .
Testing is completed .
The second step : Making malicious macro templates for remote loading docx file
1. Upload malicious files to the server
First, upload the template file containing malicious code that has just been made to the server , Here the github To do this experiment , Click the malicious file uploaded in the figure below .
You will enter the following page
Copy this page's url
And in url Followed by ?raw=true, The final results are as follows , Save this line and you'll use it later .https://github.com/shanfenglan/test/blob/master/Doc1.dotm?raw=true
2. Load malicious files on the server
open word Double click any template to use , Then save everything in any path without changing .
Rename the file , Change it to zip ending .
Unzip it
Get into word In folder _rels, find settings.xml.rels file
Edit this file , Put its target Change the value of the attribute to the one above url, That is to say
https://github.com/shanfenglan/test/blob/master/Doc1.dotm?raw=true, Then save to exit .
Next, compress the file just extracted and generated , And change the name to suffix docx The file of .
result
Direct double click 1.docx file
It will look like this after opening. We don't care about him , Just click OK , Then click enable content .
Found that the Trojan is online
Then throw this file to vitrual total Check and kill the virus , It was found that only the anti-virus software of two companies thought it was a virus
So the experiment is over .
summary
as everyone knows ,docx File cannot execute macro code , So send docx It's easy for the other party to relax their vigilance when filing , So as to improve the success rate of attack .
边栏推荐
- MySQL5.72. MSI installation failed
- Drug disease association prediction based on multi-scale heterogeneous network topology information and multiple attributes
- PHP uses redis to implement distributed locks
- Summary of leetcode's dynamic programming 4
- Simulation volume leetcode [general] 1062 Longest repeating substring
- 国产游戏国际化离不开专业的翻译公司
- Tms320c665x + Xilinx artix7 DSP + FPGA high speed core board
- 云服务器 AccessKey 密钥泄露利用
- 今日夏至 Today‘s summer solstice
- Phishing & filename inversion & Office remote template
猜你喜欢
记一个基于JEECG-BOOT的比较复杂的增删改功能的实现
Postman core function analysis - parameterization and test report
The whole process realizes the single sign on function and the solution of "canceltoken" of undefined when the request is canceled
What are the commonly used English words and sentences about COVID-19?
SourceInsight Chinese garbled
LeetCode 1200. Minimum absolute difference
[mqtt from getting started to improving series | 01] quickly build an mqtt test environment from 0 to 1
[ 英语 ] 语法重塑 之 英语学习的核心框架 —— 英语兔学习笔记(1)
基於JEECG-BOOT的list頁面的地址欄參數傳遞
Advanced MySQL: Basics (1-4 Lectures)
随机推荐
CS-证书指纹修改
LeetCode - 152 乘积最大子数组
中英对照:You can do this. Best of luck祝你好运
The pit encountered by keil over the years
翻译影视剧字幕,这些特点务必要了解
论文翻译英译中,怎样做翻译效果好?
Defense (greed), FBI tree (binary tree)
Convert the array selected by El tree into an array object
[no app push general test plan
生物医学本地化翻译服务
Grouping convolution and DW convolution, residuals and inverted residuals, bottleneck and linearbottleneck
Today's summer solstice
CS passed (cdn+ certificate) PowerShell online detailed version
The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
Lecture 8: 1602 LCD (Guo Tianxiang)
[ 英语 ] 语法重塑 之 英语学习的核心框架 —— 英语兔学习笔记(1)
Biomedical localization translation services
Postman core function analysis - parameterization and test report
Qt:无法定位程序输入点XXXXX于动态链接库。
基于JEECG-BOOT制作“左树右表”交互页面