当前位置:网站首页>Phishing & filename inversion & Office remote template
Phishing & filename inversion & Office remote template
2022-07-06 06:32:00 【zxl2605】
This article involves procedures / Technical principles can be offensive , Only for safety research and teaching , Be sure to experiment in a simulated environment , Do not use it for other purposes .
The consequences caused thereby shall be borne by oneself , In case of violation of national laws, it shall bear all legal responsibilities by itself , It has nothing to do with the author and the sharer
0x01 Piece name reversal
In the process of infiltration , Sometimes you need to spread some Trojan files by fishing , These Trojan files need careful camouflage .RLO namely Start Of Right-to-Left override. We can insert Unicode Control characters RLO To achieve the effect of reversing file names
With CobaltStrike Generated Trojan BypassAV.exe For example
1、 Generating Trojan files
2、 Join us and we want this trojan horse to be disguised as zip The file of
because RLO It's from right to left , We edit the file and choose Rename , stay .exe Front input piz
3、 stay BypassAV after piz Right click the front position to select Unicode Control characters , And then choose RLO
4、 Check the file properties. The file suffix has become zip
0x02 Self decompression release execution
Self extracting is a way to bundle files , utilize WinRAR Compress the normal file with the Trojan , And create a self extracting exe file , After the decompression process, you can automatically run the released file
Operation steps
1、 We put the generated Trojan horse in the same level directory with the files that need to be compressed ( You can also use different levels of directories ), Name the Trojan file envchk.exe
2、 Right click all to select the file to be compressed , And then click " Add to compressed file "
3、 Choose to create a compressed file in self extracting format
4、 Select the self extracting option in the advanced options
5、 Configure the decompression path , The release path of the program after level 1 runs
Here we configure C:\PragramData Catalog
6、 In the Settings tab, set the program to be run after the program is decompressed
The path here is filled in the absolute path or relative path after file decompression
7、 Quiet mode in mode is configured to hide all
8、 Configure shortcuts
At advanced level > Add shortcuts to shortcuts
9、 Click Finish to generate the self extracting package
10、 Run the generated self decompression to find that the software can be opened normally ,CS You can also go online normally
see Programdata Catalog , You can see that the file was released successfully
0x3 Office Load remote template
Remote macro template technology , It is based on the principle that documents created with templates will load templates at startup , Replace its loaded normal template with a malicious template with a macro virus , Two documents are mainly involved :
1、docx: Documents created using templates normally
2、dotm: Compared with sending macro documents directly, malicious macro template files with macro viruses , Sent in this way docx The document will be more hidden , It will not be detected by the killing software , Because the document itself does not contain macros .
office Load templates remotely
1、 First create a macro template file
2、 Select the macro location as the current document , Then create a macro
3、 Write and save the macro code as dotm file
4、 Upload the macro template file to the Internet
5、 Use the template to create a docx file
6、 After saving the document , Change the suffix to zip Format , And will word_res\settings.xml.res Extract the file
7、 modify settings.xml.res Medium tartget Field , Replace it with the macro virus template file on the Internet , And compress the file into a document
8、 Open the modified document , I saw that the template with macro virus was downloaded from the Internet when the document was opened
9、 Then click enable macro , Find out CS Online
边栏推荐
- 模拟卷Leetcode【普通】1109. 航班预订统计
- Simulation volume leetcode [general] 1296 Divide an array into a set of consecutive numbers
- Changes in the number of words in English papers translated into Chinese
- 模拟卷Leetcode【普通】1091. 二进制矩阵中的最短路径
- Past and present lives of QR code and sorting out six test points
- Aike AI frontier promotion (2.13)
- Financial German translation, a professional translation company in Beijing
- 模拟卷Leetcode【普通】1062. 最长重复子串
- My daily learning records / learning methods
- 中英对照:You can do this. Best of luck祝你好运
猜你喜欢
Database - current read and snapshot read
mysql按照首字母排序
Detailed explanation of P problem, NP problem, NPC problem and NP hard problem
D - How Many Answers Are Wrong
端午节快乐Wish Dragon Boat Festival is happy
英语论文翻译成中文字数变化
金融德语翻译,北京专业的翻译公司
How to extract login cookies when JMeter performs interface testing
MySQL5.72. MSI installation failed
关于新冠疫情,常用的英文单词、语句有哪些?
随机推荐
win10无法操作(删除、剪切)文件
Isam2 and incrementalfixedlagsmooth instructions in gtsam
LeetCode 739. Daily temperature
Delete the variables added to watch1 in keil MDK
leetcode 24. 两两交换链表中的节点
Black cat takes you to learn UFS Protocol Part 8: UFS initialization (boot operation)
翻译影视剧字幕,这些特点务必要了解
国际经贸合同翻译 中译英怎样效果好
模拟卷Leetcode【普通】1143. 最长公共子序列
Making interactive page of "left tree and right table" based on jeecg-boot
F - true liars (category and search set +dp)
基于JEECG-BOOT制作“左树右表”交互页面
MySQL5.72. MSI installation failed
Biomedical localization translation services
Oscp raven2 target penetration process
Error getting a new connection Cause: org. apache. commons. dbcp. SQLNestedException
模拟卷Leetcode【普通】1314. 矩阵区域和
Is the test cycle compressed? Teach you 9 ways to deal with it
Cobalt Strike特征修改
The pit encountered by keil over the years