Microsoft Word UNC Path Injector...

- AV AC AU C I A
发布: 2024-08-31
修订: 2024-12-11

This Metasploit module modifies a .docx file that will, upon opening, submit stored netNTLM credentials to a remote host. It can also create an empty docx file. If emailed the receiver needs to put the document in editing mode before the remote server will be contacted. Preview and read-only mode do not work. Verified to work with Microsoft Word 2003, 2007, 2010, and 2013. In order to get the hashes the auxiliary/server/capture/smb module can be used.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息