Vulnerability & Exploit Database

Back to search

Microsoft Office DDE Payload Delivery

This module generates an DDE command to place within a word document, that when executed, will retrieve a HTA payload via HTTP from an web server.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/fileformat/office_dde_delivery

Authors

  • mumbai

References

Targets

  • Microsoft Office

Platforms

  • windows

Architectures

  • x86
  • x64

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/fileformat/office_dde_delivery msf exploit(office_dde_delivery) > show targets ...targets... msf exploit(office_dde_delivery) > set TARGET <target-id> msf exploit(office_dde_delivery) > show options ...show and set options... msf exploit(office_dde_delivery) > exploit