pedro ubuntu - 2016-08-27


[ BYPASS_MACRO_SANDBOX ]
Version: 1.6 Author: pedr0 Ubuntu [ r00t-3xp10it ]
Hosted By: peterubuntu10[at]sourceforge[dot]net
http://sourceforge.net/projects/msf-auxiliarys/
https://sourceforge.net/p/msf-auxiliarys/repository/ci/master/tree/bypass_macro_sandbox.rb
Download bypass_macro_sandbox.rb




[ MODULE DESCRIPTION ]
alternate text


[ MODULE ADVANCED OPTIONS ]
alternate text





[ WORK FLOW - CONFIG REQUIRED SETTINGS ]
'GET_SYSTEM' allows users to elevate current session (client) to nt authority/system
'Its advice to run this option the first time the module runs, to elevate client privileges'
alternate text





[ WORK FLOW - CONFIG REQUIRED SETTINGS ]
'MACRO_BYPASS' will add to target regedit 2 registry keys 'VBAWarnings' and 'AccessVBOM'
that changes the security level for Word/Excel macro down to 'Enable all macros'.
alternate text
VBAWarnings - registry description
AccessVBOM - registry description





[ WORK FLOW - CONFIG REQUIRED SETTINGS ]
'REVERT_BYPASS' will allow us to revert to default office macro security settings or
if used the option 'DWORD' we can set a diferent dword value (only available in 'revert_bypass')
alternate text





[ WORK FLOW - MODULE DEFAULT SETTINGS ]
bypass_macro_sandbox.rb uses pre-defined 'default settings' to make exploiting time faster:
alternate text
By default we dont need to config any of this settings unless the user wants to, that can
be acomplished (manually) by executing: 'set [option] [value inputed by user]'.
alternate text





[ MODULE ERROR REPORTS ]
New metasploit release have changed the class name to use 'MetasploitModule' so
if you are seeing this display it means that your metasploit its using an old class name.
To fix this display just edit one of metasploit modules and check what class name
your version its using, then replace in my module the (class MetasploitModule) constante...
alternate text





[ MODULE ERROR REPORTS ]
This post-module It runs only against Windows systems, if the user tries to run it againts other systems, then wil present one 'unsupported' display and aborts module execution...
alternate text





[ MODULE ERROR REPORTS ]
'REVERT_BYPASS' changes macro security settings (regedit) to default values (dword:2)
unless the user decides to set 'VBAWarnings' another dword value "set DWORD <value>"
alternate text
revert_bypass funtion allows users to set 'VBAWarnings' from dword:2 to dword:4 values, if user trys to set a non-supported dword value then my module will warn user and aborts execution...</value>





[ POST - MODULE LIMITATIONS ]

  This module only runs againts windows systems (native cmd syntax)
  As part of post-exploitation class this module requires one open session
  This module only runs in a meterpreter shell enviroment (meterpreter client)
  "Target system needs to be reboot for the registry changes take effect"...




[ PORT MODULE TO METASPLOIT DATABASE ]

  Kali linux [COPY TO]: /usr/share/metasploit-framework/modules/post/windows/manage/bypass_macro_sandbox.rb
  Ubuntu linux [COPY TO]: /opt/metasploit/apps/pro/msf3/modules/post/windows/manage/bypass_macro_sandbox.rb
  Manually Path Search: root@kali:~# locate modules/post/windows/manage



[ LOAD - USE MODULE ]

  meterpreter > background
  msf exploit(handler) > reload_all
  msf exploit(handler) > use post/windows/manage/bypass_macro_sandbox
  msf post(bypass_macro_sandbox) > info
  msf post(bypass_macro_sandbox) > show options
  msf post(bypass_macro_sandbox) > show advanced options
  msf post(bypass_macro_sandbox) > set [option(s)]
  msf post(bypass_macro_sandbox) > exploit




[ CREDITS ]

  'r00t-3xp10it' =>  post-module author
  Inspiration: Filipe [ Excel class mate ]
  Debugging: milton@barra

Suspicious Shell Activity - RedTeam develop @2016






[ VIDEO TUTORIAL ]

Video not available



 

Last edit: pedro ubuntu 2016-08-30