module
MS14-052 Microsoft Internet Explorer XMLDOM Filename Disclosure
| Disclosed | Created |
|---|---|
| Sep 9, 2014 | May 30, 2018 |
Disclosed
Sep 9, 2014
Created
May 30, 2018
Description
This module will use the Microsoft XMLDOM object to enumerate a remote machine's filenames.
It will try to do so against Internet Explorer 8 and Internet Explorer 9. To use it, you
must supply your own list of file paths. Each file path should look like this:
c:\windows\system32\calc.exe
It will try to do so against Internet Explorer 8 and Internet Explorer 9. To use it, you
must supply your own list of file paths. Each file path should look like this:
c:\windows\system32\calc.exe
Authors
Soroush Dalili
sinn3r [email protected]
sinn3r [email protected]
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.