module

Microsoft Office Word MSDTJS

Disclosed
2022-05-29
Created
2022-06-07

Description

This module generates a malicious Microsoft Word document that when loaded, will leverage the remote template
feature to fetch an `HTML` document and then use the `ms-msdt` scheme to execute `PowerShell` code.

Authors

nao sec
mekhalleh (RAMELLA Sébastien)
bwatters-r7

Platform

Windows

Architectures

x86, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/fileformat/word_msdtjs_rce
msf exploit(word_msdtjs_rce) > show targets
...targets...
msf exploit(word_msdtjs_rce) > set TARGET < target-id >
msf exploit(word_msdtjs_rce) > show options
...show and set options...
msf exploit(word_msdtjs_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.