DDE attack with PowerShell Empire Logo

DDE attack with PowerShell Empire

0
Free
Visit Website

The DDE attack with PowerShell Empire allows for weaponizing a Word document with a PowerShell Empire-based payload, leveraging the Microsoft DDE exploit to execute code in MS Word and other Microsoft products. For more information, refer to the original research at: https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/ To execute this attack, ensure you have set up an Empire listener.

FEATURES

ALTERNATIVES

A Live CD and Live USB for penetration testing and security assessment

A penetration testing framework for identifying and exploiting vulnerabilities.

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

SharpShares efficiently enumerates and maps network shares and resolves names within a domain.

A collection of precompiled Windows exploits for privilege escalation.

A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.

Emulate operating systems behind SSH servers for testing automation.

A reminder that technology alone is not enough to stay secure against social engineering tactics.

PINNED