我正在学习*无国界医生在卡利,但我遇到了一个问题。
我正在尝试一个简单的adobe_pdf_embedded_exe,当我将INFILENAME设置为简单的东西(比如nutrition.pdf )时,它找不到文件,所以显然我需要一个路径,对吗?
因此,我尝试设置INFILENAME (目录)。这确实有效,并让流程完成,但当我键入show options时,它将/root/downloads/nutrition.pdf显示为INFILENAME。
我很困惑如何将infilename和filename设置为nutrition.pdf,而不显示显示选项中的路径。我所遵循的指南没有显示如何将路径设置为您想要目标的原始PDF。
发布于 2016-07-23 16:28:42
加载模块后,在控制台提示符处键入info。你会看到它所期望的。INFILENAME是要使用现有PDF的路径,文件名是导出恶意PDF的文件名。
msf exploit(adobe_pdf_embedded_exe) > info
Name: Adobe PDF Embedded EXE Social Engineering
Module: exploit/windows/fileformat/adobe_pdf_embedded_exe
Platform: Windows
Privileged: No
License: Metasploit Framework License (BSD)
Rank: Excellent
Disclosed: 2010-03-29
Provided by:
Colin Ames <amesc@attackresearch.com>
jduck <jduck@metasploit.com>
Available targets:
Id Name
-- ----
0 Adobe Reader v8.x, v9.x / Windows XP SP3 (English/Spanish) / Windows Vista/7 (English)
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
EXENAME no The Name of payload exe.
FILENAME evil.pdf no The output filename.
INFILENAME /pentest/exploitation/metasploit/data/exploits/CVE-2010-1240/template.pdf yes The Input PDF filename.
LAUNCH_MESSAGE To view the encrypted content please tick the "Do not show this message again" box and press Open. no The message to display in the File: area
Payload information:
Space: 2048
Description:
This module embeds a Metasploit payload into an existing PDF file.
The resulting PDF can be sent to a target as part of a social
engineering attack.
References:
http://cvedetails.com/cve/2010-1240/
http://www.osvdb.org/63667
http://blog.didierstevens.com/2010/04/06/update-escape-from-pdf/
http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/
http://blog.didierstevens.com/2010/03/29/escape-from-pdf/
http://www.adobe.com/support/security/bulletins/apsb10-15.htmlhttps://security.stackexchange.com/questions/130808
复制相似问题