O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Metasploitable PDF

In this recipe, we will explore how to use Metasploit to perform an attack using the Portable Document Format (PDF) document exploited with the Adobe PDF Embedded module. An Adobe PDF is a highly used standard for transmitting a document to another party. Due to its widespread use, especially because of its business usage, we will attack a user's machine by allowing the user to think they are opening a legitimate PDF document from a job applicant.

Getting ready

The following requirements need to be fulfilled:

  • A connection to the internal network is required to complete this recipe
  • Metasploitable running in our hacking lab
  • Word list to perform a dictionary attack

How to do it...

Let's begin the process by opening a terminal window: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required