当前位置:网站首页>Office doc add in - Online CS
Office doc add in - Online CS
2022-07-06 06:36:00 【zxl2605】
principle
The remote malicious template with macros will be loaded directly for use .
- shortcoming
The network speed of the target host determines the speed of loading the remote template . It is possible that the file will be opened very slowly ( For example, put the remote template in github), The victim may force the file to close halfway through the opening word. - advantage
Because it is loaded remotely , So the killing free effect is very good . Basically will not be blocked by anti-virus software .
Realization
First step : Make a malicious template and ensure that it can go online
Here we use cs The macro Trojan horse For example .
Get malicious VB Open after code word, Right click in an empty area of the toolbar , Click Customize Ribbon
Check the development tool option .
At this point, the development tools column will appear
Click here Visual basic, Copy malicious code to project The designated location of is shown in the figure below
Then close the code box , Put this word Save the file as a dotm Template file
At this time, you can test whether the template can be launched , Right click the template file , Double clicking cannot open the template file , Double click on the template file to create a new file with this template by default , Bear in mind .
Click enable content to go online .
Testing is completed .
The second step : Making malicious macro templates for remote loading docx file
1. Upload malicious files to the server
First, upload the template file containing malicious code that has just been made to the server , Here the github To do this experiment , Click the malicious file uploaded in the figure below .
You will enter the following page
Copy this page's url
And in url Followed by ?raw=true, The final results are as follows , Save this line and you'll use it later .https://github.com/shanfenglan/test/blob/master/Doc1.dotm?raw=true
2. Load malicious files on the server
open word Double click any template to use , Then save everything in any path without changing .
Rename the file , Change it to zip ending .
Unzip it
Get into word In folder _rels, find settings.xml.rels file
Edit this file , Put its target Change the value of the attribute to the one above url, That is to say
https://github.com/shanfenglan/test/blob/master/Doc1.dotm?raw=true, Then save to exit .
Next, compress the file just extracted and generated , And change the name to suffix docx The file of .
result
Direct double click 1.docx file
It will look like this after opening. We don't care about him , Just click OK , Then click enable content .
Found that the Trojan is online
Then throw this file to vitrual total Check and kill the virus , It was found that only the anti-virus software of two companies thought it was a virus
So the experiment is over .
summary
as everyone knows ,docx File cannot execute macro code , So send docx It's easy for the other party to relax their vigilance when filing , So as to improve the success rate of attack .
边栏推荐
- 关于新冠疫情,常用的英文单词、语句有哪些?
- Distributed system basic (V) protocol (I)
- The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
- Grouping convolution and DW convolution, residuals and inverted residuals, bottleneck and linearbottleneck
- Simulation volume leetcode [general] 1314 Matrix area and
- Fledgling Xiao Li's 103rd blog CC2530 resource introduction
- Mise en œuvre d’une fonction complexe d’ajout, de suppression et de modification basée sur jeecg - boot
- It is necessary to understand these characteristics in translating subtitles of film and television dramas
- 記一個基於JEECG-BOOT的比較複雜的增删改功能的實現
- 如何将flv文件转为mp4文件?一个简单的解决办法
猜你喜欢
MySQL5.72. MSI installation failed
In English translation of papers, how to do a good translation?
Cobalt strike feature modification
LeetCode - 152 乘积最大子数组
Changes in the number of words in English papers translated into Chinese
Redis core technology and basic architecture of actual combat: what does a key value database contain?
How much is it to translate Chinese into English for one minute?
ECS accessKey key disclosure and utilization
Suspended else
云服务器 AccessKey 密钥泄露利用
随机推荐
Suspended else
云服务器 AccessKey 密钥泄露利用
How to convert flv file to MP4 file? A simple solution
CS通过(CDN+证书)powershell上线详细版
Black cat takes you to learn EMMC Protocol Part 10: EMMC read and write operation details (read & write)
Grouping convolution and DW convolution, residuals and inverted residuals, bottleneck and linearbottleneck
Address bar parameter transmission of list page based on jeecg-boot
删除外部表源数据
字幕翻译中翻英一分钟多少钱?
org.activiti.bpmn.exceptions.XMLException: cvc-complex-type.2.4.a: 发现了以元素 ‘outgoing‘ 开头的无效内容
How to translate biomedical instructions in English
查询字段个数
Oscp raven2 target penetration process
Drug disease association prediction based on multi-scale heterogeneous network topology information and multiple attributes
翻译影视剧字幕,这些特点务必要了解
如何将flv文件转为mp4文件?一个简单的解决办法
基於JEECG-BOOT的list頁面的地址欄參數傳遞
Simulation volume leetcode [general] 1447 Simplest fraction
What are the commonly used English words and sentences about COVID-19?
记一个基于JEECG-BOOT的比较复杂的增删改功能的实现