TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OLEOutlook: Bypass Almost Every Corporate Security Control with a GUI

256 pointsby Signezover 9 years ago

9 comments

lifeisstillgoodover 9 years ago
tl;dr using an old but still valid OLE component, you can embed any exe in a word doc, convert to rich text, that then faithfully re-expands the exe onto users runtime when they open the word doc - a perfect malware delivery method that if correct has almost no defence beyond ... Plain text emails.<p>(The firewall would need to re-expand the rich text using this OLE, then scan the word doc, then repackage. Unsurprisingly nothing on market seems to. Jeez - stick to plain text)<p>One suspects that a lot of spear-phisers know about this already.
评论 #10793944 未加载
评论 #10793875 未加载
评论 #10794169 未加载
评论 #10794188 未加载
评论 #10794394 未加载
TazeTSchnitzelover 9 years ago
Oh, I used this in [what America would probably call] middle school to run Game Maker on school computers which didn&#x27;t have it. Embed a file in a PowerPoint presentation, and bingo.
Animatsover 9 years ago
I thought Microsoft had gotten over their tendency to execute anything executable that gets anywhere near a Windows machine. Apparently not.
评论 #10795389 未加载
danielrm26over 9 years ago
This is one of the main things I test when doing application security assessments.<p>I look at the various clients&#x2F;interfaces and test each of them to see how their controls compare. It&#x27;s quite often that certain clients or interfaces have far less security on them than others because it simply isn&#x27;t convenient.<p>One example would be two-factor on a VPS administration page. It&#x27;s on the main site, but if you download the mobile app it&#x27;s password only.<p>Which means...it&#x27;s password only (assuming you know how to use a proxy like Burp).<p>So important to ensure that all interfaces to your app have the same minimum requirements for security.
评论 #10794920 未加载
NetStrikeForceover 9 years ago
All these people claiming to have known this for years seem to think the trick is to embed an executable inside an Office file.<p>Well, you might want to read the article again. See now the difference?
bowyakkaover 9 years ago
Good god that trick still works. I used to use this on windows 3.11 and winword.exe 2.0 in high school. We had RM nimbus computers (UK horrible educational computer manufacturer) that were locked down and didn&#x27;t want to run arbitrary things.<p>I found this trick, we used to play doom and rise of the triad with this and some other glue. I am surprised this trick still works so well for foxing security checkers
NvidiaCUDAover 9 years ago
I&#x27;ve used this &quot;trick&quot; for years to get a console window on a locked-down machine that I needed access to.
评论 #10794794 未加载
kenOfYugenover 9 years ago
Duplicate:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10790734" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10790734</a>
评论 #10794767 未加载
评论 #10794054 未加载
评论 #10795475 未加载
tyhoover 9 years ago
I am not sure I understand this issue. Only a crazy person would think they have the power to block all code entering their network. Stenography is a one sided battle.
评论 #10793951 未加载
评论 #10794035 未加载
评论 #10793972 未加载
评论 #10794165 未加载