首页
社区
课程
招聘
[转帖]Malicious VBA Macro’s: Trials and Tribulations
发表于: 2021-1-22 06:46 2371

[转帖]Malicious VBA Macro’s: Trials and Tribulations

2021-1-22 06:46
2371

Malicious VBA Macro’s: Trials and Tribulations

Introduction

Over this past winter break, I wanted to go back to learning more about malicious Word/Excel Macros and what the potential is there. I made a blog post over a year ago where I talked about a technique I haven’t seen used very often involving linking a remote VBA template to a word doc, which was then downloaded and ran only when the document is open. In that same blog post, I also added a self-deletion technique, making it harder for the blue team to run forensics on the malicious doc. In this post, I’ll be talking about other techniques I’ve learned, including calling Windows API functions, and I’ll be discussing my (somewhat) failed attempt to write VBA that dumps the LSASS process, but also my successful attempt at writing a reverse shell completely in VBA (no shellcode injection or dropping exe’s).

297K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6B7L8$3S2F1i4K6u0V1N6$3!0G2k6r3#2S2L8W2)9J5k6h3y4G2L8g2)9J5c8Y4u0W2M7$3g2S2M7X3y4Z5i4K6u0r3L8h3q4D9K9h3y4A6L8%4g2K6i4K6u0V1N6X3u0S2i4K6u0V1L8h3q4U0M7X3!0K6i4K6u0V1N6s2u0A6j5h3I4K6i4K6u0V1N6s2u0A6j5Y4g2D9j5i4c8A6L8$3&6K6i4K6u0r3



[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 4
支持
分享
最新回复 (2)
雪    币: 2517
活跃值: (8945)
能力值: ( LV2,RANK:15 )
在线值:
发帖
回帖
粉丝
2

网页本地存档

上传的附件:
2021-1-22 18:30
0
雪    币: 106611
活跃值: (202414)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
3
FleTime 网页本地存档
2021-1-22 18:32
0
游客
登录 | 注册 方可回帖
返回