-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Metasploit Penetration Testing Cookbook
By :
In the previous two recipes, we focused completely on browser-based exploits. Now in this recipe, we will focus on another popular Windows tool called Microsoft Office. The RTF buffer overflow flaw exists in both 2010 and 2007 versions of the Office software pack. This vulnerability exists in the handling of pfragments shape property within the Microsoft Word RTF parser. Let us understand this exploit in detail. I am assuming that we have already gained information about our target that it has Office pack installed on his system.
We will start with launching the msfconsole. The exploit we will be using in this recipe can be located at exploit/windows/fileformat/ms10_087_rtf_pfragments_bof. The payload we will be using is windows/meterpreter/reverse_tcp to get shell connectivity with the target machine.
The working process will again be similar to what we have seen so far in previous recipes. We will first set our exploit...
Change the font size
Change margin width
Change background colour