0

Executing Metasploit & Empire Payloads from MS Office Document Properties (part 2 of 2)

  Building on from my previous post, this will primarily focus on delivering an Empire payload via an embedded offensive PowerShell script stored within the ‘comments’ property of an MS Excel document. PowerShell Empire: Begin by creating an Empire listener,… Continue Reading

0

Executing Metasploit & Empire Payloads from MS Office Document Properties (part 1 of 2)

  As a penetration tester I’m always excited to see new and creative methods on creating weaponized MS Office documents.  This blog post builds on the following findings published by Black Hills InfoSec: https://www.blackhillsinfosec.com/hide-payload-ms-office-document-properties/ There are numerous ways on how… Continue Reading