Hacking Book | Free Online Hacking Learning

Home

share your technology and add some temperature for safety

Posted by verstraete at 2020-03-02
all

For the use of very ignorant, looked at other people's post, found that really clear a lot.

Recurrence vulnerability cve-2017-8759

The vulnerability affects all major. Net framework versions

Microsoft .NET Framework4.6.2

Microsoft .NET Framework4.6.1

Microsoft .NET Framework3.5.1

Microsoft .NET Framework4.7

Microsoft .NET Framework4.6

Microsoft .NET Framework4.5.2

Microsoft .NET Framework3.5

Microsoft .NET Framework 2.0 SP2

Environmental Science:

Kali linux    IP:   192.168.1.118

Win8.1 target IP: 192.168.1.19 (office2013)

Generating HTA backdoor with empire in Kali

Modify the expand.txt file

Open Apache or use Python - M simplehttpserver to establish a link

And upload HTA to the same path.

Then use word to create a new RTF and insert an object linked to the file http://192.168.1.118:808/exploit.txt

Then use C32 to edit blob.bin, and change the location as follows

Right click to copy all of hex format and open RTF file with editor to replace code

Insert objeupdate before objeautlink

After saving and modifying, let's test the effect!

(o゜▽゜)o☆[BINGO!]

Another way to use gestures is to use macros to load HTA files. Project address:

Reference source:

https://bbs.77169.com/forum.php?mod=viewthread&tid=364738