Commit 5fe3fd3171c161eca13eac6c2930c1cf93eed6bd

Authored by decalage2
1 parent fe4e9c31

doc: updated for 0.53

oletools/README.html
... ... @@ -19,11 +19,24 @@
19 19 <h1 id="python-oletools">python-oletools</h1>
20 20 <p><a href="https://pypi.python.org/pypi/oletools"><img src="https://img.shields.io/pypi/v/oletools.svg" alt="PyPI" /></a> <a href="https://travis-ci.org/decalage2/oletools"><img src="https://travis-ci.org/decalage2/oletools.svg?branch=master" alt="Build Status" /></a></p>
21 21 <p><a href="http://www.decalage.info/python/oletools">oletools</a> is a package of python tools to analyze <a href="http://en.wikipedia.org/wiki/Compound_File_Binary_Format">Microsoft OLE2 files</a> (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the <a href="http://www.decalage.info/olefile">olefile</a> parser. See <a href="http://www.decalage.info/python/oletools" class="uri">http://www.decalage.info/python/oletools</a> for more info.</p>
22   -<p><strong>Quick links:</strong> <a href="http://www.decalage.info/python/oletools">Home page</a> - <a href="https://github.com/decalage2/oletools/wiki/Install">Download/Install</a> - <a href="https://github.com/decalage2/oletools/wiki">Documentation</a> - <a href="https://github.com/decalage2/oletools/issues">Report Issues/Suggestions/Questions</a> - <a href="http://decalage.info/contact">Contact the Author</a> - <a href="https://github.com/decalage2/oletools">Repository</a> - <a href="https://twitter.com/decalage2">Updates on Twitter</a></p>
  22 +<p><strong>Quick links:</strong> <a href="http://www.decalage.info/python/oletools">Home page</a> - <a href="https://github.com/decalage2/oletools/wiki/Install">Download/Install</a> - <a href="https://github.com/decalage2/oletools/wiki">Documentation</a> - <a href="https://github.com/decalage2/oletools/issues">Report Issues/Suggestions/Questions</a> - <a href="http://decalage.info/contact">Contact the Author</a> - <a href="https://github.com/decalage2/oletools">Repository</a> - <a href="https://twitter.com/decalage2">Updates on Twitter</a> <a href="https://github.com/decalage2/oletools/blob/master/cheatsheet/oletools_cheatsheet.pdf">Cheatsheet</a></p>
23 23 <p>Note: python-oletools is not related to OLETools published by BeCubed Software.</p>
24 24 <h2 id="news">News</h2>
25 25 <ul>
26   -<li><strong>2018-02-18 v0.52</strong>:
  26 +<li><strong>2018-05-30 v0.53</strong>:
  27 +<ul>
  28 +<li>olevba and mraptor can now parse Word/PowerPoint 2007+ pure XML files (aka Flat OPC format)</li>
  29 +<li>improved support for VBA forms in olevba (oleform)</li>
  30 +<li>rtfobj now displays the CLSID of OLE objects, which is the best way to identify them. Known-bad CLSIDs such as MS Equation Editor are highlighted in red.</li>
  31 +<li>Updated rtfobj to handle obfuscated RTF samples.</li>
  32 +<li>rtfobj now handles the &quot;\'&quot; obfuscation trick seen in recent samples such as https://twitter.com/buffaloverflow/status/989798880295444480, by emulating the MS Word bug described in https://securelist.com/disappearing-bytes/84017/</li>
  33 +<li>msodde: improved detection of DDE formulas in CSV files</li>
  34 +<li>oledir now displays the tree of storage/streams, along with CLSIDs and their meaning.</li>
  35 +<li>common.clsid contains the list of known CLSIDs, and their links to CVE vulnerabilities when relevant.</li>
  36 +<li>oleid now detects encrypted OpenXML files</li>
  37 +<li>fixed bugs in oleobj, rtfobj, oleid, olevba</li>
  38 +</ul></li>
  39 +<li>2018-02-18 v0.52:
27 40 <ul>
28 41 <li>New tool <a href="https://github.com/decalage2/oletools/wiki/msodde">msodde</a> to detect and extract DDE links from MS Office files, RTF and CSV;</li>
29 42 <li>Fixed bugs in olevba, rtfobj and olefile, to better handle malformed/obfuscated files;</li>
... ... @@ -31,18 +44,6 @@
31 44 <li>VBA form parsing in olevba;</li>
32 45 <li>Office 2007+ support in oleobj.</li>
33 46 </ul></li>
34   -<li>2017-06-29 v0.51:
35   -<ul>
36   -<li>added the <a href="https://github.com/decalage2/oletools/blob/master/cheatsheet/oletools_cheatsheet.pdf">oletools cheatsheet</a></li>
37   -<li>improved <a href="https://github.com/decalage2/oletools/wiki/rtfobj">rtfobj</a> to handle malformed RTF files, detect vulnerability CVE-2017-0199</li>
38   -<li>olevba: improved deobfuscation and Mac files support</li>
39   -<li><a href="https://github.com/decalage2/oletools/wiki/mraptor">mraptor</a>: added more ActiveX macro triggers</li>
40   -<li>added <a href="https://github.com/decalage2/oletools/blob/master/oletools/DocVarDump.vba">DocVarDump.vba</a> to dump document variables using Word</li>
41   -<li>olemap: can now detect and extract <a href="http://decalage.info/en/ole_extradata">extra data at end of file</a>, improved display</li>
42   -<li>oledir, olemeta, oletimes: added support for zip files and wildcards</li>
43   -<li>many <a href="https://github.com/decalage2/oletools/milestone/3?closed=1">bugfixes</a> in all the tools</li>
44   -<li>improved Python 2+3 support</li>
45   -</ul></li>
46 47 </ul>
47 48 <p>See the <a href="https://github.com/decalage2/oletools/wiki/Changelog">full changelog</a> for more information.</p>
48 49 <h2 id="tools">Tools:</h2>
... ... @@ -65,7 +66,7 @@
65 66 <li><a href="https://github.com/decalage2/oletools/wiki/olemap">olemap</a>: to display a map of all the sectors in an OLE file.</li>
66 67 </ul>
67 68 <h2 id="projects-using-oletools">Projects using oletools:</h2>
68   -<p>oletools are used by a number of projects and online malware analysis services, including <a href="http://viper.li/">Viper</a>, <a href="https://remnux.org/">REMnux</a>, <a href="https://certsocietegenerale.github.io/fame/">FAME</a>, <a href="https://www.hybrid-analysis.com/">Hybrid-analysis.com</a>, <a href="https://www.document-analyzer.net/">Joe Sandbox</a>, <a href="https://sandbox.deepviz.com/">Deepviz</a>, <a href="https://github.com/lmco/laikaboss">Laika BOSS</a>, <a href="https://github.com/cuckoosandbox/cuckoo">Cuckoo Sandbox</a>, <a href="https://sandbox.anlyz.io/">Anlyz.io</a>, <a href="https://github.com/decalage2/ViperMonkey">ViperMonkey</a>, <a href="https://github.com/bontchev/pcodedmp">pcodedmp</a>, <a href="https://dridex.malwareconfig.com">dridex.malwareconfig.com</a>, and probably <a href="https://www.virustotal.com">VirusTotal</a>. (Please <a href="(http://decalage.info/contact)">contact me</a> if you have or know a project using oletools)</p>
  69 +<p>oletools are used by a number of projects and online malware analysis services, including <a href="http://viper.li/">Viper</a>, <a href="https://remnux.org/">REMnux</a>, <a href="https://certsocietegenerale.github.io/fame/">FAME</a>, <a href="https://www.hybrid-analysis.com/">Hybrid-analysis.com</a>, <a href="https://www.document-analyzer.net/">Joe Sandbox</a>, <a href="https://sandbox.deepviz.com/">Deepviz</a>, <a href="https://github.com/lmco/laikaboss">Laika BOSS</a>, <a href="https://github.com/cuckoosandbox/cuckoo">Cuckoo Sandbox</a>, <a href="https://sandbox.anlyz.io/">Anlyz.io</a>, <a href="https://github.com/decalage2/ViperMonkey">ViperMonkey</a>, <a href="https://github.com/bontchev/pcodedmp">pcodedmp</a>, <a href="https://dridex.malwareconfig.com">dridex.malwareconfig.com</a>, <a href="https://github.com/countercept/snake">Snake</a>, <a href="https://github.com/cryps1s/DARKSURGEON">DARKSURGEON</a>, and probably <a href="https://www.virustotal.com">VirusTotal</a>. (Please <a href="(http://decalage.info/contact)">contact me</a> if you have or know a project using oletools)</p>
69 70 <h2 id="download-and-install">Download and Install:</h2>
70 71 <p>The recommended way to download and install/update the <strong>latest stable release</strong> of oletools is to use <a href="https://pip.pypa.io/en/stable/installing/">pip</a>:</p>
71 72 <ul>
... ...
oletools/README.rst
... ... @@ -21,6 +21,7 @@ Issues/Suggestions/Questions &lt;https://github.com/decalage2/oletools/issues&gt;`__
21 21 - `Contact the Author <http://decalage.info/contact>`__ -
22 22 `Repository <https://github.com/decalage2/oletools>`__ - `Updates on
23 23 Twitter <https://twitter.com/decalage2>`__
  24 +`Cheatsheet <https://github.com/decalage2/oletools/blob/master/cheatsheet/oletools_cheatsheet.pdf>`__
24 25  
25 26 Note: python-oletools is not related to OLETools published by BeCubed
26 27 Software.
... ... @@ -28,7 +29,29 @@ Software.
28 29 News
29 30 ----
30 31  
31   -- **2018-02-18 v0.52**:
  32 +- **2018-05-30 v0.53**:
  33 +
  34 + - olevba and mraptor can now parse Word/PowerPoint 2007+ pure XML
  35 + files (aka Flat OPC format)
  36 + - improved support for VBA forms in olevba (oleform)
  37 + - rtfobj now displays the CLSID of OLE objects, which is the best
  38 + way to identify them. Known-bad CLSIDs such as MS Equation Editor
  39 + are highlighted in red.
  40 + - Updated rtfobj to handle obfuscated RTF samples.
  41 + - rtfobj now handles the "\'" obfuscation trick seen in recent
  42 + samples such as
  43 + https://twitter.com/buffaloverflow/status/989798880295444480, by
  44 + emulating the MS Word bug described in
  45 + https://securelist.com/disappearing-bytes/84017/
  46 + - msodde: improved detection of DDE formulas in CSV files
  47 + - oledir now displays the tree of storage/streams, along with CLSIDs
  48 + and their meaning.
  49 + - common.clsid contains the list of known CLSIDs, and their links to
  50 + CVE vulnerabilities when relevant.
  51 + - oleid now detects encrypted OpenXML files
  52 + - fixed bugs in oleobj, rtfobj, oleid, olevba
  53 +
  54 +- 2018-02-18 v0.52:
32 55  
33 56 - New tool
34 57 `msodde <https://github.com/decalage2/oletools/wiki/msodde>`__ to
... ... @@ -39,28 +62,6 @@ News
39 62 - VBA form parsing in olevba;
40 63 - Office 2007+ support in oleobj.
41 64  
42   -- 2017-06-29 v0.51:
43   -
44   - - added the `oletools
45   - cheatsheet <https://github.com/decalage2/oletools/blob/master/cheatsheet/oletools_cheatsheet.pdf>`__
46   - - improved
47   - `rtfobj <https://github.com/decalage2/oletools/wiki/rtfobj>`__ to
48   - handle malformed RTF files, detect vulnerability CVE-2017-0199
49   - - olevba: improved deobfuscation and Mac files support
50   - - `mraptor <https://github.com/decalage2/oletools/wiki/mraptor>`__:
51   - added more ActiveX macro triggers
52   - - added
53   - `DocVarDump.vba <https://github.com/decalage2/oletools/blob/master/oletools/DocVarDump.vba>`__
54   - to dump document variables using Word
55   - - olemap: can now detect and extract `extra data at end of
56   - file <http://decalage.info/en/ole_extradata>`__, improved display
57   - - oledir, olemeta, oletimes: added support for zip files and
58   - wildcards
59   - - many
60   - `bugfixes <https://github.com/decalage2/oletools/milestone/3?closed=1>`__
61   - in all the tools
62   - - improved Python 2+3 support
63   -
64 65 See the `full
65 66 changelog <https://github.com/decalage2/oletools/wiki/Changelog>`__ for
66 67 more information.
... ... @@ -123,8 +124,10 @@ Sandbox &lt;https://github.com/cuckoosandbox/cuckoo&gt;`__,
123 124 `Anlyz.io <https://sandbox.anlyz.io/>`__,
124 125 `ViperMonkey <https://github.com/decalage2/ViperMonkey>`__,
125 126 `pcodedmp <https://github.com/bontchev/pcodedmp>`__,
126   -`dridex.malwareconfig.com <https://dridex.malwareconfig.com>`__, and
127   -probably `VirusTotal <https://www.virustotal.com>`__. (Please `contact
  127 +`dridex.malwareconfig.com <https://dridex.malwareconfig.com>`__,
  128 +`Snake <https://github.com/countercept/snake>`__,
  129 +`DARKSURGEON <https://github.com/cryps1s/DARKSURGEON>`__, and probably
  130 +`VirusTotal <https://www.virustotal.com>`__. (Please `contact
128 131 me <(http://decalage.info/contact)>`__ if you have or know a project
129 132 using oletools)
130 133  
... ...
oletools/doc/Home.html
... ... @@ -16,7 +16,7 @@
16 16 <![endif]-->
17 17 </head>
18 18 <body>
19   -<h1 id="python-oletools-v0.52-documentation">python-oletools v0.52 documentation</h1>
  19 +<h1 id="python-oletools-v0.53-documentation">python-oletools v0.53 documentation</h1>
20 20 <p>This is the home page of the documentation for python-oletools. The latest version can be found <a href="https://github.com/decalage2/oletools/wiki">online</a>, otherwise a copy is provided in the doc subfolder of the package.</p>
21 21 <p><a href="http://www.decalage.info/python/oletools">python-oletools</a> is a package of python tools to analyze <a href="http://en.wikipedia.org/wiki/Compound_File_Binary_Format">Microsoft OLE2 files</a> (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the <a href="http://www.decalage.info/olefile">olefile</a> parser. See <a href="http://www.decalage.info/python/oletools" class="uri">http://www.decalage.info/python/oletools</a> for more info.</p>
22 22 <p><strong>Quick links:</strong> <a href="http://www.decalage.info/python/oletools">Home page</a> - <a href="https://github.com/decalage2/oletools/wiki/Install">Download/Install</a> - <a href="https://github.com/decalage2/oletools/wiki">Documentation</a> - <a href="https://github.com/decalage2/oletools/issues">Report Issues/Suggestions/Questions</a> - <a href="http://decalage.info/contact">Contact the Author</a> - <a href="https://github.com/decalage2/oletools">Repository</a> - <a href="https://twitter.com/decalage2">Updates on Twitter</a></p>
... ...
oletools/doc/Home.md
1   -python-oletools v0.52 documentation
  1 +python-oletools v0.53 documentation
2 2 ===================================
3 3  
4 4 This is the home page of the documentation for python-oletools. The latest version can be found
... ...