Description: Mark Baggett demonstrates how Metasploit Visual Basic payloads can be embedded into Microsoft Office Documents as macros. In this video he shows how to embed a VNC payload into an Office Document and how to exploit an unsuspecting victim with it. He also adds that such an embedded payload is virtually undetectable by anti-virus softwares today, thus making it a serious threat. In order to mitigate this attack you will need to set your Office Document Macro Security to HIGH. Instructions to do so are available here.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
WOW thats awesome! nice video! thnx! and ya know most people dont even pay attn to the macro security level of a word document :) talk about E-Z access :)