Client-side Attacks

exiftool -a -u quote.pdf
circle-info

Passive recon viewing metadata of publicly available documents to view potential installed software on the target machine

Use Canary Tokens to fingerprint the remote machine

Macros in Word documents

circle-info

Save as .doc (Word 97-2003 Document)

Open powershell

Reverse shell macro

Encode in base64

Python script to break ouput into smaller chunks

Final Macro script

Last updated