Skip to content
Embed and hide any file in an HTML file
Branch: master
Clone or download
Latest commit 604974b Sep 27, 2017
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
output Added second flavor of the tool Sep 27, 2017
payloads_examples Initial commit Sep 11, 2017
templates Added second flavor of the tool Sep 27, 2017
.gitattributes Initial commit Sep 11, 2017
LICENSE Initial commit Sep 11, 2017
embedInHTML.html Typo and file name Sep 27, 2017
embedInHTML.py new BlobShim Sep 12, 2017
readme.md

readme.md

Embed and hide any file in HTML

Author: Arno0x0x - @Arno0x0x

What this tool does is taking a file (any type of file), encrypt it, and embed it into an HTML file as ressource, along with an automatic download routine simulating a user clicking on the embedded ressource.

Then, when the user browses the HTML file, the embedded file is decrypted on the fly, saved in a temporary folder, and the file is then presented to the user as if it was being downloaded from the remote site. Depending on the user's browser and the file type presented, the file can be automatically opened by the browser.

This tool comes in two flavors, providing the same overall functionnality but with some slight changes in the way of using it:

  1. An python script which generates the output HTML file based on a template, using RC4 encryption routines, and embedding the decryption key within the output file. The resulting HTML can either be browsed by the targeted user or sent as an attachement.

  2. An HTML/Javascript that you can drag the file into be encrypted to, which generates the output HTML file, using the WebCrypto API, but NOT embedding the decryption material (key and counter). Instead, the decryption material is displayed as a set of URL parameters to be added into a URL pointing to the HTML resulting file: http(s)://hosting.server.com/result.html#hexencodedkey!hexencodedcounter. So the resulting HTML file cannot be sent as an attachment. The main advantage of this technique is that the decryption material is not embedded into the file itself, hence preventing analysis and even retrieval of the payload by any system which doesn't have the full URL (eg: intercepting proxy)

Side notes:

Usage

Few payload examples files are provided in the payloads_examples directory. For instance the calc.xll is an Excel add-in (XLL) file that contains a metasploit shellcode for x86 processes to launch the calc.exe process.

Using the python script

1/ Generate the malicious html file from the XLL file, along with a secret key: python embedInHTML.py -k mysecretkey -f example_calc.xll -o index.html

2/ Expose the html file on a web server (one can be optionnaly started for you with the -w flag)

Using the HTML/Javascript

1/ Open the embedInHTML.html file within a browser

2/ Simply drag the payload file into the page (you can optionnaly change the output file name)

3/ Save the resulting file and take note of the decryption material as URL parameters to be added to the file name in the form: http(s)://hosting.server.com/result.html#hexencodedkey!hexencodedcounter

Eventually...

Point the target's browser to the html file and let the magic happen:

DISCLAIMER

This tool is intended to be used in a legal and legitimate way only:

  • either on your own systems as a means of learning, of demonstrating what can be done and how, or testing your defense and detection mechanisms
  • on systems you've been officially and legitimately entitled to perform some security assessments (pentest, security audits)

Quoting Empire's authors: There is no way to build offensive tools useful to the legitimate infosec industry while simultaneously preventing malicious actors from abusing them.

You can’t perform that action at this time.