Vulnerability & Exploit Database

Back to search

Cain and Abel RDP Buffer Overflow

This module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24 and below. An attacker must send the file to victim, and the victim must open the specially crafted RDP file under Tools -> Remote Desktop Password Decoder.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/fileformat/cain_abel_4918_rdp

Authors

  • Trancek <trancek [at] yashira.org>

References

Targets

  • Windows XP SP2 English
  • Windows XP SP0/1 English
  • Windows XP SP2 Spanish

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/fileformat/cain_abel_4918_rdp msf exploit(cain_abel_4918_rdp) > show targets ...targets... msf exploit(cain_abel_4918_rdp) > set TARGET <target-id> msf exploit(cain_abel_4918_rdp) > show options ...show and set options... msf exploit(cain_abel_4918_rdp) > exploit