Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork24
License
BC-SECURITY/Offensive-VBA-and-XLS-Entanglement
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
This repo provides examples of how VBA can be used for offensive purposes beyond a simple dropper or shell injector. As we develop more use cases, the repo will be updated. The main entry in the repo is the code for demonstrating the XLS Entanglement attack.
VBA provides every capability that other offensive languages offer including rudimentry reflection capability with the modification of the AccessVBOM registry key. In addition to that, VBA runs inside of programs that are traditionally long running programs on a victim's computers including Outlook. This means that a beacon can run entirely inside "native processes without the need to migrate processes or open additional ports. If Outlook is converted to a C2 beacon, then there is no need for the beacon to reach out of the network either. With the ability to export Win32 APIs we have the ability to execute all kinds of attacks, including things likeKerberoasting or runningEmbedded PEs.
File | Description |
---|---|
HelloWorld.vba | Demonstrates disabling the protections against accessing the VBA project and dynamically injecting VBA code |
HelloWorldWin32_API.vba | Same as HelloWorld.vba but uses Win32 APIs instead of WScript to modify the registry |
OutlookC2_POC.vba | Macro to convert Outlook into a C2 that watches for an email and injects VBA into an Excel file |
XLS Entaglement | Contains the files for executing a rudimentry XLS Entanglement attack |
About
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Releases
Sponsor this project
Uh oh!
There was an error while loading.Please reload this page.
Packages0
Contributors2
Uh oh!
There was an error while loading.Please reload this page.