May 2018
Intermediate to advanced
492 pages
10h 54m
English
Word-based exploits focus on various file formats that we can load into Microsoft Word; however, a few file formats execute malicious code, and can let the attacker gain access to the target system. We can take advantage of Word-based vulnerabilities in the same way as we did for PDF files. Let's quickly see some basic facts related to this vulnerability:
|
Test cases |
Description |
|
Vulnerability |
This module creates a malicious RTF file which, when opened in vulnerable versions of Microsoft Word, will lead to code execution. The flaw exists in how an olelink object can make an HTTP(s) request and execute HTA code in response. |
|
Exploited on the operating system |
Windows 7 32-bit |
|
Software version in our ... |
Read now
Unlock full access