Navigation Menu

Skip to content

dru1d-foofus/doc-tracking-payload

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

doc-tracking-payload

Tracking Document Payloads

This is a really basic PoC for tracking whether a unique user has opened an email attachment. Arguably, you cannot really be 100% the correct user has accessed the attachment vs. another user or potentially a sandbox with this method. If there are more novel ways of doing this without macros, I'd be excited to hear them.

This currently functions by embedding a tracking pixel in the header of an Office document which points at an external resource. User correlation is possible because each time a document is generated, a new RID is assigned to it. There's nothing inherently malicious about the blank template so hopefully it won't be flagged by AV.

Example Operation

First setup a webserver (I use pythom -m SimpleHTTPServer 1337 or whatever)

python -m SimpleHTTPServer 1337
Serving HTTP on 0.0.0.0 port 1337 ...

Then create the payload and send it over to the target

./doc-tracking.py --lhost 192.168.1.9 --lport 1337 --cleanup
Host: 192.168.1.9
Port: 1337
RID: e2be995d43034f3f89a34a9433071f3c
Outputfile: Doc1-e2be995d43034f3f89a34a9433071f3c.docx
Waiting for file operations to finish...
./tmp-extract/ has been cleaned up

When the payload is opened you should receive confirmation

192.168.1.18 - - [01/Nov/2018 18:53:28] code 404, message File not found
192.168.1.18 - - [01/Nov/2018 18:53:28] "GET /img.php?rid=e2be995d43034f3f89a34a9433071f3c&type=img HTTP/1.1" 404 -

About

sometimes during phishing campaigns you want to track whether an attachment has been opened; here's my current PoC for that

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages