Phishing Tecniques
Last updated
Last updated
Two main methods:
URL download: File gets MOTW (ZoneId=3 for Internet). Triggers security warnings (SmartScreen/Protected View).
Email attachment: No MOTW if sent internally (via compromised Exchange). Fewer warnings, higher success rate.
MOTW: Marks untrusted downloads (via browser). Blocks macros by default in Office. Zones:
0: Local | 1: Intranet | 2: Trusted | 3: Internet | 4: Restricted.
Key takeaway: Attachments (no MOTW) evade more defenses than URL downloads.
Create a blank document
View > Macros > Select document
Generate a payload (Cobalt Strike Example for CRTO)
Attacks > Scripted Web Delivery (S)
Set URI Path
Set Host (nickelviper.com)
Set Port (80)
Set Listener HTTP/DNS
Set type: Powershell
Enable Use X64 Payload
Copy the payload and set it into the macro.
Save as .doc
.
Send the file whether via email from a compromise Exchange to avoid the MOTW or any methods you want.
Create a blank document
View > Macros > Select document
Attacks > Scripted Web Delivery (S)
Set URI Path
Set Host (nickelviper.com)
Set Port (80)
Set Listener HTTP/DNS
Set type: Powershell
Enable Use X64 Payload
Copy the payload and set it into the macro.
Save as .dot
.
Host the file (python server|Cobalt Striket Server)
Create a new black template
Save as .docx
By using 1-zip click on file
Go to Word > _rels > settings.xml.rels
Modify the target
parameter within the settings.xml.rels
file with the .dot
file you created before and is hosted.
Send the file whether via email from a compromise Exchange to avoid the MOTW or any methods you want.
If you see you possess Write permission over public SMB share in your target domain or you see the website accepts uploading files you could use tools such as ntlm_theft to create a malicious files and steal NTLMv2 Hash
Some places to steal NTLMV2 Hashes
Generate a payload (Cobalt Strike Example for CRTO)