Update doc

bug/bundler_fix
wchen-r7 2017-02-16 12:49:29 -06:00
parent 7ec5ec6442
commit 056313e411
1 changed files with 2 additions and 2 deletions

View File

@ -12,7 +12,7 @@ executable when the Office document is launched.
## Vulnerable Application
A Windows machine with Microsoft Office installed. The Office application must support the docm
A Windows or OSX machine with Microsoft Office installed. The Office application must support the docm
format.
Specifically, this module was tested specifically against:
@ -49,7 +49,7 @@ To use this exploit in a real environment, you will most likely need to modify t
Here's one approach you can do:
1. Use the module to generate the malicious docm
2. Copy the malicious docm to a Windows machine, and edit it with Microsoft Office (such as 2013).
2. Copy the malicious docm to the vulnerable machine, and edit it with Microsoft Office (such as 2013).
When you open the document, the payload will probably do something on your machine. It's ok,
since you generated it, it should not cause any problems for you.
3. Save the doc, and test again to make sure the payload still works.