Posted on Thursday, July 30th, 2015 by Tony Gee.
This is part 2 following on from my how-to on setting up a hacked Word document to demo a remote connect-back. Now you have set up your document you need to configure Metasploit to receive the connection when the victim opens the document and enables macros. Setting up the receiver In Kali open a terminal […] Read More
Posted on Wednesday, July 29th, 2015 by Joe Bursell.
If you’re going to be at DefCon 23 in Las Vegas next week then do come along to our IoT Village workshop, Saturday August 8th at 10:00 (full schedule here). Hacking You Fat: The Fitbit Aria Scales. A hands-on workshop The hour long workshop will start with a brief presentation covering our research to date […] Read More
Posted on Tuesday, July 28th, 2015 by Tony Gee.
We did a hack demo video a while back that explored how a poisoned MS Office document can be used to give a connect-back foothold to an attacker. At 1:57 long it couldn’t really explain the details of such an attack so here is a much more granular look at the same idea. In this […] Read More
<< Older posts