Metasploit mailing list archives
adobe_pdf_embedded_exe working? msf 3.3 dev windows
From: thesels1 at hushmail.me (thesels1 at hushmail.me)
Date: Sun, 11 Oct 2009 19:06:29 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 hi, no evil.pdf is created in c:\pentest\data\. using msf 3.3 dev/win. msf exploit(adobe_pdf_embedded_exe) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- EXENAME c:/pentest/calc.exe no The Name of payload exe. FILENAME evil.pdf no The output filename. INFILENAME c:/pentest/1.pdf no The Input PDF filename. OUTPUTPATH c:/pentest/data/ no The location to output the file. Payload options (windows/meterpreter/bind_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC thread yes Exit technique: seh, thread, process LPORT 4444 yes The local port RHOST no The target address Exploit target: Id Name -- ---- 0 Adobe Reader v8.x, v9.x (Windows XP SP3 English) [*] Started bind handler [*] Reading in 'c:/pentest/1.pdf'... [*] Parseing 'c:/pentest/1.pdf'... [*] Parseing Successfull. [*] Using 'c:/pentest/calc.exe' as payload... [-] Exploit failed: key not found [*] Exploit completed, but no session was created. cheers, sels1 -----BEGIN PGP SIGNATURE----- Charset: UTF8 Version: Hush 3.0 Note: This signature can be verified at https://www.hushtools.com/verify wpwEAQMCAAYFAkrSjyUACgkQhx5k37N4+4D17AP/TS9TrYcj1q17to7EOA5z1+GYFtE3 1BBswhoxVtUE2UwGBNFvu57oVzGY/7rhfoY0A3h3Y5e1Ek3bthDkqewIH+SNReIe9+tc 2Oj3z9xB4neupTA5MHu+EsYyDK0lPCvEcn+AwO0FSaIWUNYbkVf8MhTHGeAeS0fQkSUD 9N5WqFc= =5+ec -----END PGP SIGNATURE-----
Current thread:
- adobe_pdf_embedded_exe working? msf 3.3 dev windows thesels1 at hushmail.me (Oct 11)
- Re: adobe_pdf_embedded_exe working? msf 3.3 dev windows egypt (Nov 06)