Lucky Strike is awesome. So I wanted to share my findings from experiments I have made.
TL:DR – LuckyStrike is an Excel file generator that will create an Excel file with a custom executable payload embedded as a macro. It has other features as well, but I was only interested in the custom EXE file insertion.
The Github for LuckyStrike is here https://github.com/Shellntel/luckystrike
Software I have used :
- Window 10 64bit (running in Virtual Box 5.1.6)
- MS Office 2013 (64bit)
- Metasploit Framework v4.12.27-dev-d2100bf
- Connor EXE generator :) https://astr0baby.wordpress.com/2016/09/23/john-connor-vs-eset-hey-eset-choose-some-other-mascot-not-a-cyborg/
- Virtual Box 5.1
So first we need to prepare the LuckyStrike environment… In Windows 10 (64bit) you need to enable this for Power Shell environment:
(Run Windows PowerShell ISE with admin privileges and set the execution policy ; execute it from some directory where you expect to have the LuckyStrike directory)
iex (new-object net.webclient).downloadstring('https://raw.githubusercontent.com/Shellntel/luckystrike/master/install.ps1')
Accept all options and allow the PSSQLite module installation.
We are ready to start Lucky Strike. Goto the dir where your LuckyStrike is and execute the PowerShell script
Make sure you type the C: with CAPITAL case, lower case for some reason always failed :)
Poisoned Excel is ready in the luckystrike\payloads directory
Execute it and enjoy the shell ;)
Attached is the video recording of the above