Commit Graph

14 Commits

Author SHA1 Message Date
Brent Cook da3ca9eb90 update some documentation 2017-08-03 17:09:44 -05:00
Yorick Koster 67dddd2402 Typo reported by @nixawk 2017-08-02 15:47:21 -05:00
Yorick Koster 3229320ba9 Code review feedback from @nixawk 2017-08-02 15:46:51 -05:00
Yorick Koster 565a3355be CVE-2017-8464 LNK Remote Code Execution Vulnerability
This module exploits a vulnerability in the handling of Windows
Shortcut files (.LNK) that contain a dynamic icon, loaded from a
malicious DLL.

This vulnerability is a variant of MS15-020 (CVE-2015-0096). The
created LNK file is similar except in an additional
SpecialFolderDataBlock is included. The folder ID set in this
SpecialFolderDataBlock is set to the Control Panel. This is enought to
bypass the CPL whitelist. This bypass can be used to trick Windows into
loading an arbitrary DLL file.
2017-08-02 15:46:30 -05:00
wchen-r7 6029a9ee2b Use a built-in HTA server and update doc 2017-04-24 16:04:27 -05:00
nixawk 0a085c4e83 add doc for exploit/windows/fileformat/office_word_hta 2017-04-18 03:26:10 -05:00
wchen-r7 34f074441d Move doc 2017-02-16 12:33:05 -06:00
wchen-r7 e891063b74 Update doc 2017-02-03 14:29:29 -06:00
wchen-r7 5db1d958b0 Update doc 2017-02-03 14:08:28 -06:00
wchen-r7 6e692b1a1c Update doc 2017-02-03 14:03:48 -06:00
wchen-r7 f3f774b9c7 Add demo 2017-02-03 12:01:51 -06:00
wchen-r7 92e065c21b Update doc 2017-02-03 11:48:18 -06:00
wchen-r7 2457968a24 Update doc 2017-02-03 11:45:34 -06:00
wchen-r7 e9ba6fe7fd Add doc 2017-02-02 20:42:46 -06:00