[prev in list] [next in list] [prev in thread] [next in thread]
List: metasploit-framework
Subject: Re: [framework] DLL name for webdav_dll_hijacker exploit
From: HD Moore <hdm () metasploit ! com>
Date: 2010-08-30 14:37:12
Message-ID: 4C7BC218.1040801 () metasploit ! com
[Download RAW message or body]
On 8/29/2010 11:26 PM, anil saini wrote:
> I m testing *webdav_dll_hijacker i*n metasploit. My exploit is working
> fine if i use it through net share.
> But i m facing problems with archives and folders which includes
> meterpreter payload DLL and file.
>
> My test steps are:-
> 1. Generate meterpreter payload DLL using msfpayload commad.
> 2. Rename DLL as DLL mentioned in various forums.(for example for
> ppt 2007 i m using pptimpconv.dll, pp7x32.dll, rpawinet.dll)
> 3. Put DLL and file.ppt in a folder
> 4. Open file.ppt from folder
>
> Same methodology using vbscript and javascript with their associated DLL
> types is working.
That is the correct way to do it, make sure no background process is
running for the affected product.
-HD
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic