Microsoft CVE-2017-8759: .NET Framework Remote Code Execution Vulnerability

A remote code execution vulnerability exists when Microsoft .NET Framework processes untrusted input. An attacker who successfully exploited this vulnerability in software using the .NET framework could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts … Read moreMicrosoft CVE-2017-8759: .NET Framework Remote Code Execution Vulnerability

Exploiting Microsoft Office and delivering a payload using Microsoft DDE

Windows provides several methods for transferring data between applications. One method is to use the Dynamic Data Exchange (DDE) protocol. The DDE protocol is a set of messages and guidelines. It sends messages between applications that share data and uses shared memory to exchange data between applications. Applications can use the DDE protocol for one-time … Read moreExploiting Microsoft Office and delivering a payload using Microsoft DDE

Attack Simulation: Meterpreter payload over reverse HTTP/HTTPS

This example will show you how to create a Meterpreter HTTP listener on a specific port and generate a payload for the target machine to connect back to. Using a reverse HTTP/HTTPS payload is more unsuspecting to the target as it appears to be normal web traffic going to a domain through port 80 or … Read moreAttack Simulation: Meterpreter payload over reverse HTTP/HTTPS

Antivirus Evasion with Shellter

The following guide will show you how to use the basic features of Shellter, AV evasion software. From the official website: Shellter is a dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. It can be used in order to inject shellcode into native Windows applications (currently 32-bit applications only). The … Read moreAntivirus Evasion with Shellter

Stealing Credentials (Metasploit)

This document will start from you having an open session to a target machine; as well as having local administrator access on the target machine; ideally through a reverse TCP connection. Once you have an active session through any exploit of your choosing; proceed with stealing credentials from the target system. Step 1: Select the … Read moreStealing Credentials (Metasploit)

Attack Simulation: Malicious Office Document (Metasploit)

This module generates a macro-enabled Microsoft Office Word document (docm). It does not target a specific CVE or vulnerability, instead it’s more of a feature-abuse in Office, and yet it’s still a popular type of social-engineering attack such as in ransomware. By default, the module uses a built-in Office document (docx) as the template. It … Read moreAttack Simulation: Malicious Office Document (Metasploit)

Attack Simulation: EternalBlue MS17-010 (Metasploit)

The vulnerability works by exploiting the Microsoft Server Message Block 1.0. The SMB is a network file sharing protocol and “allows applications on a computer to read and write to files and to request services” that are on the same network. This demonstration will show you how to remotely take control of a system by … Read moreAttack Simulation: EternalBlue MS17-010 (Metasploit)