Update doc
parent
7ec5ec6442
commit
056313e411
|
@ -12,7 +12,7 @@ executable when the Office document is launched.
|
|||
|
||||
## Vulnerable Application
|
||||
|
||||
A Windows machine with Microsoft Office installed. The Office application must support the docm
|
||||
A Windows or OSX machine with Microsoft Office installed. The Office application must support the docm
|
||||
format.
|
||||
|
||||
Specifically, this module was tested specifically against:
|
||||
|
@ -49,7 +49,7 @@ To use this exploit in a real environment, you will most likely need to modify t
|
|||
Here's one approach you can do:
|
||||
|
||||
1. Use the module to generate the malicious docm
|
||||
2. Copy the malicious docm to a Windows machine, and edit it with Microsoft Office (such as 2013).
|
||||
2. Copy the malicious docm to the vulnerable machine, and edit it with Microsoft Office (such as 2013).
|
||||
When you open the document, the payload will probably do something on your machine. It's ok,
|
||||
since you generated it, it should not cause any problems for you.
|
||||
3. Save the doc, and test again to make sure the payload still works.
|
||||
|
|
Loading…
Reference in New Issue