Client-Side
Information Gathering
site:example.com filetype:pdf
ffuf -ic -w <WORDLIST>:X -u <URL>/X -e .pdf
exiftool -a -u <FILE>
Generates token links to be sent to the victim, which, once opened, acquire information about the system and send it to a specified email address.
Microsoft Macro
Send files containing malicious macros When the file comes from an external source (internet, ex. email or direct link), will be protected with MOTW. The victim must be persuaded to click on Enable Editing/Enable Content/Checkbox to unblock. Or you need to find a way to prevent MOTW from being applied.
Create a Word file with extension
.doco.docm(no.docxbecause it doesn't incorporate or save macros in the document, so it is not persistent).View->Macros-><NAME>(document)-><CODE VBA>Visual Basic for ApplicationsWrite the macro by accessing the underlying operating system commands with WScript via the Windows Script Host Shell object.
Windows Library Files
Windows library files are virtual containers for user content. They connect users with data stored in remote locations like web services or shares. These files have a .Library-ms file extension and can be executed by double-clicking them in Windows Explorer.
Create a Windows Library Files (
.Library-ms) to be sent to the victim. When they double-click on this file, it will appear as a normal directory in Windows Explorer.Setup WebDAV
pipx install wsgidavmkdir webdav; wsgidav --host=0.0.0.0 --port=80 --auth=anonymous --root ./webdavCreate malicious files to be inserted into the WebDAV server (ex.
.ink)Send
.Library-msfile to the victim and convince them to double-click on our.lnkpayload file to execute it.
Last updated
Was this helpful?