bhdresh / CVE-2017-0199

Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
724 stars 261 forks source link

Server Running on : 80 no more #42

Closed jackjackamerica closed 7 years ago

jackjackamerica commented 7 years ago

@bhdresh

i tested all scenarios on microsoft office 2007 2010 2013 2016 on a victim windows 7 64bit but in all scena rios it stuck on this part: Running exploit mode (Deliver HTA + Local Payload) - waiting for victim to connect Server Running on : 80

Received GET method from ... and no more . i did every thing same as scenario , and i put shell.exe in /var/www/html but i donno what to do can anyone help me? in addition, can you tell me the targets and their necassary features?

bhdresh commented 7 years ago

Make sure -e argument is appropriate.

I would also suggest followings,

1) Ensure vulnerability is not patched on the target. Check windows update history. 2) Ensure target IE version should be at least IE10. It was pointed out in metasploit thread that it should be at least IE10 (rapid7/metasploit-framework#8220). 3) Generate an RTF without obfuscation using -x 0 to ensure generated RTF is not broken.

Thanks.

jackjackamerica commented 7 years ago

again it didn't work @bhdresh this can't be possible because the PCs which have win 7 , have IE 8 by default
so if they want to update their IE to 11 , they have to update windows so the payload can't be worked

bhdresh commented 7 years ago

Why do you think the only way to update IE is only through windows update? You should be able to update IE saperately.