Bypass Gmail security filters

Gmail's security filters responsible for detecting malicious macros can be bypassed if you split the "word s” to two or more, according to security researchers at SecureState.

security gmail

Malicious macros are pieces of code that are usually enclosed in files και αν ο χρήστης τρέξει αυτά τα αρχεία τότε το κακόβουλο performs a number of tasks.

Macros in general were created to simplify various scenarios of identical work, but they also became backs in the hands of thugs.

Microsoft blocks the automatic execution of these scenarios, and also email service providers have begun scanning the attached files by looking for macro scenarios that may be contained in them.

Η SecureState reports that the gmail immediately detects an Office document as malicious if the script it contains uses specific words.

Στις δοκιμές τους, το Gmail εντοπίσει ένα αρχείο Excel ως κακόβουλο όταν στον κώδικά του περιείχε τη λέξη “PowerShell”, ένα πολύ ισχυρό βοηθητικό πρόγραμμα της Microsoft scripting, το οποίο με μακροεντολές θα μπορούσε να αλληλεπιδράσει με λειτουργικό σύστημα των .

Surprisingly, when they split that word into two, they managed to bypass the Gmail security filter.

An intruder who knows this trick is just needing to adjust his own file name to two separate lines as shown below.

Str = "powershe" Str = Str + "ll.exe -NoP - not -NonI -W Hidden -Enc JAB3"

In addition, SecureState researcher Mike Benich reports that Gmail maliciously detects any macro-scripts in Excel files that enable the "workbook open" function, but has managed to bypass this security feature as well. simply by placing the dangerous code under a button.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).