Exploit Remote PC using Microsoft Office Word Malicious Hta Execution

For Kali Linux users we had performed this attack through Metasploit without using any python script which generates .rtf file for the attack, thus the user only needs to update their Kali Linux and load Metasploit framework to start this attack. This is a zero-day exploit that has excellent rating against Ms-office vulnerability which can be very easily used to shoot any targeted windows system.

Attacker: Kali Linux

Target: MS Office

Let’s breach!!

This module creates a malicious RTF file that when opened in vulnerable versions of Microsoft Word will lead to code execution. The flaw exists in how an OLE link object can make an http(s) request, and execute hta code in response. This bug was originally seen being exploited in the wild starting in Oct 2016. This module was created by reversing a public malware sample.

This module will automatically generate a malicious .rtf file inside /root/.msf4/local/sales.doc moreover it will generate a link and that link must be share to target using social engineering method.

When the user will open that link and make double-click (OLE event) on .hta file, the attacker will receive meterpreter session in the Metasploit framework.

Author: Aarti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets. Contact here

1 Comment Exploit Remote PC using Microsoft Office Word Malicious Hta Execution

Leave a Reply

Your email address will not be published. Required fields are marked *