Closed jackjackamerica closed 7 years ago
Make sure -e argument is appropriate.
I would also suggest followings,
1) Ensure vulnerability is not patched on the target. Check windows update history. 2) Ensure target IE version should be at least IE10. It was pointed out in metasploit thread that it should be at least IE10 (rapid7/metasploit-framework#8220). 3) Generate an RTF without obfuscation using -x 0 to ensure generated RTF is not broken.
Thanks.
again it didn't work
@bhdresh
this can't be possible because the PCs which have win 7 , have IE 8 by default
so if they want to update their IE to 11 , they have to update windows
so the payload can't be worked
Why do you think the only way to update IE is only through windows update? You should be able to update IE saperately.
@bhdresh
i tested all scenarios on microsoft office 2007 2010 2013 2016 on a victim windows 7 64bit but in all scena rios it stuck on this part: Running exploit mode (Deliver HTA + Local Payload) - waiting for victim to connect Server Running on : 80
Received GET method from ... and no more . i did every thing same as scenario , and i put shell.exe in /var/www/html but i donno what to do can anyone help me? in addition, can you tell me the targets and their necassary features?