Malicious office documents are one of the main
attack vectors for attackers trying to compromise a system.
There are 2
main methods to create a malicious Word Document:
- CVE-based.
- Functionality-based.
Both
methods have their pros and cons, but the main problem with the CVE-based
approach is that it usually requires certain versions of the software to be
used by target. In reality, we are not always aware of the exact version of the
software installed, so that using CVE-based approached can lead to a failed
attack attempt.
On the
other hand, functionality-based approach, as can be understood from the name,
uses functionalities that are part of the software itself (Microsoft Word, in
our case) and can be successfully executed on all versions of the software.
In the
article the functionality-based approached will be discussed with the main
focus on Macros.