Skip to content

Drac0nids/CVE-2017-8570

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

用法:

下载脚本后修改attack_ip为kali的ip,LPORT为msf要监听的端口,DIR为任意空目录

给脚本777的权限

chmod 777 auto

然后运行脚本

./auto

然后在DIR+Office8570 目录下找到Invoice.ppsx文件,将其发送给被攻击者 被攻击者打开Invoice.ppsx文件后会利用powershell下载shell.exe,然后会返回一个meterpreter

About

## 在kali中自动化生成cve-2017-8570的恶意ppsx文件和配置msf监听

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published