HTA Attacks
notes Alyssa Snow notes Alyssa Snow

HTA Attacks

HTA’s are often used by attackers to deliver malware to victims. Today we will walk through how to create our own HTA that allows us to run arbitrary commands on a Windows host.

Read More
Creating Malicious Macros
notes Alyssa Snow notes Alyssa Snow

Creating Malicious Macros

Macros are used to automate Microsoft Office tasks. Malicious macros are commonly leveraged by adversaries to execute client-side attacks. This post will walk you through how to create your own Macro to run arbitrary commands.

Read More