Making Malicious Microsoft Office Documents
Hello world and welcome to HaXeZ, in this post I’m going to be explaining how you can hack anyone with a Microsoft Office Document. Ok, nothing is ever going to work 100% of the time. I was going through the Red Team Weaponization room on TryHackMe and I loved this technique so much that I wanted to make a separate post on it.
Music - bensound.com
00:00 Introduction
01:09 Creating A Macro
03:46 Popping Programs
05:22 Reverse Shells
08:43 Conclusions
*Socials*
* Haxez - https://haxez.org/
* Rob’s Blog - https://www.bordergate.co.uk/
* Twitter - https://twitter.com/haXez_org
*Miscellaneous*
* https://amzn.to/45AMKrJ Hack Disguise
* https://amzn.to/43hMb4s Mil-Tec Tactical Backpack
* https://amzn.to/3IQbWRb Black Hoodie
*Hardware*
* https://amzn.to/3MJmnad Alfa AWUS036ACH
* https://amzn.to/43zB1YE Alfa AWUS036ACS
* https://amzn.to/43eySSm Alfa AWUS036ACHM
* https://amzn.to/43gdGLR Alfa AWUS036NHA
* https://amzn.to/43y9wyv ATTiny85 Digispark
*Books*
* https://amzn.to/3C02Qxz Red Team Field Manual
* https://amzn.to/45ygiq1 Blue Team Field Manual
* https://amzn.to/43yaHOn PTFM: Purple Team Field Manual
* https://amzn.to/3MKXgEh Hash Crack: Password Cracking Manual
* https://amzn.to/43DuBrv Serious Cryptography
* https://amzn.to/42g3UYw Ethical Hacking
* https://amzn.to/45D58A8 Black Hat GraphQL
* https://amzn.to/43Ab6QE Hardware Hacking Handbook
* https://amzn.to/3C2gjET Cyberjutsu
* https://amzn.to/3C192oS Gray Hat C#
* https://amzn.to/43wd9Fa Practical IoT Hacking
* https://amzn.to/3WKV9oy Bug Bounty Bootcamp
* https://amzn.to/3OVlgqC The Art Of Cyberwarfare
* https://amzn.to/3OLqW6E Black Hat Python
* https://amzn.to/3C8uMiw Penetration Testing
* https://amzn.to/3oFDMc2 Art of Mac Malware
* https://amzn.to/3N25F7y Attacking Network Protocols
* https://amzn.to/3N66aNG Designing Secure Software
* https://amzn.to/3MIgHxh Rootkits and Bootkits
* https://amzn.to/3C1KWdR Practical Doomsday
* https://amzn.to/43BhbMq The Car Hacking Handbook
*Crypto*
* Doge: D7bGHhx78F1dLDS8yaMnF9fYX2CyY8ekwT
* BTC: bc1qtn75ut0299uzseqyhj6fh047a9nljj0j2ghj6a
* LTC: ltc1qdmynth2pqedmentm4t49c2wdgdj9kvg9y43x30
* ETH: 0x74FeeD2E98a5250CFedED7bB332357b48282d088
-
0:42
DailyTechNews
1 year agoYou can get hacked through a word document
-
8:03
shadycloud0day
1 year agoHow you can get hacked by opening a word document
10 -
37:21
Excel For Freelancers
3 years ago $0.01 earnedHow To Create Custom Word Documents From Excel WITHOUT Mail Merge
45 -
43:12
The Drunk Linux User
2 years agoLINUX OFFICE SOFTWARES
742 -
15:40
ComputerScienceVideos
1 year agoMac Office: How to Use Microsoft Word - The Basics, Tricks and Tips | New
1 -
15:46
ComputerScienceVideos
1 year agoMac Office: How to Use Microsoft Word - The Basics, Tricks and Tips | New
1 -
2:35
SeffnerTech
3 years agoCreate an Editable PDF with LibreOffice
82 -
1:02
Digital Trends
3 years agoIs Your Boss Using Microsoft Office to Spy on You?
407 -
16:05
GrapheneGoat
4 months ago $0.01 earnedHello LibreOffice, Goodbye Microsoft Office 365 | A Free Office Suite
2182 -
6:27
excelsoftware
2 years agoExcel Workbook Protection - Secure Launch User Experience
7