Red Team Notes
CtrlK
  • What is ired.team notes?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
      • Password Spraying Outlook Web Access: Remote Shell
      • Phishing with MS Office
        • Phishing: XLM / Macro 4.0
        • T1173: Phishing - DDE
        • T1137: Phishing - Office Macros
        • Phishing: OLE + LNK
        • Phishing: Embedded Internet Explorer
        • Phishing: .SLK Excel
        • Phishing: Replacing Embedded Video with Bogus Payload
        • Inject Macros from a Remote Dotm Template
        • Bypassing Parent Child / Ancestry Detections
        • Phishing: Embedded HTML Forms
      • Phishing with GoPhish and DigitalOcean
      • Forced Authentication
      • NetNTLMv2 hash stealing using Outlook
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Internals
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
Powered by GitBook
On this page
  1. offensive security
  2. Initial Access

Phishing with MS Office

Phishing: XLM / Macro 4.0T1173: Phishing - DDET1137: Phishing - Office MacrosPhishing: OLE + LNKPhishing: Embedded Internet ExplorerPhishing: .SLK ExcelPhishing: Replacing Embedded Video with Bogus PayloadInject Macros from a Remote Dotm TemplateBypassing Parent Child / Ancestry DetectionsPhishing: Embedded HTML Forms
PreviousPassword Spraying Outlook Web Access: Remote ShellNextPhishing: XLM / Macro 4.0

Last updated 6 years ago