Skip to content

Phishing: Embedded HTML Forms

In this phishing lab I am just playing around with the POCs researched, coded and described by Yorick Koster in his blog post Click me if you can, Office social engineering with embedded objects


{% file src="../../../.gitbook/assets/forms.html.ps1" caption="Forms.ps1" %}

{% file src="../../../.gitbook/assets/forms.html.docx" caption="Forms.docx" %}


These types of phishing documents can be identified by looking for the CLSID 5512D112-5CC6-11CF-8D67-00AA00BDCE1D in the embedded .bin files: well as inside the activeX1.xml file:

As usual, MS Office applications spawning cmd.exe or powershell.exe should be investigated:


{% embed url="" %}