forensicsPromedium
Темный образец (Dark Sample)
hackerlab
Task: Analyze a Word document with hidden data. Solution: Extract DOCX structure, find Remote Template Injection in settings.xml.rels, download the remote .dotm template, extract VBA macros with olevba, and decode Base32 string from comments to get the flag.
$ ls tags/ techniques/
remote_template_injectiondocx_structure_analysisvba_extractionbase32_decoding
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [stego][Pro]Office Document Stego (e73e49dc)— hackerlab
- [stego][Pro]Santa's Report— grodno_new_year_2026
- [stego][Pro]zapzap— spbctf
- [stego][Pro]Ответ ИИ— duckerz
- [forensics][free]Diagnostic— hackthebox