WebDAV DLL Hijacking Tutorial

Un0wn_X
11 years ago | edited 11 years ago

0

[youtube]=c-9IIfgVgCc[/youtube] http://www.securitytube.net/video/7326[/center] This exploit will present malicious files on a server and once we entice the victim to visit ourserver and open our file he will be injected with our malicious dll and we can have our payload running. The webdav dll hijacker is located at exploits/windows/browser/webdav_dll_hijacking. Next set your payload as a windows/meterpreter/reverse_tcp and set the local host and the local port. In here I used the extension as ppt. Well once you enter exploit metasploit will start the server and once the victim visits our server he should see a powerpoint presentation in our case. When he opens it we should get our payload working. To learn more about DLL security read this: http://msdn.microsoft.com/en-us/library/ff919712%28VS.85%29.aspx [center]![Image](http://cdn1.iconfinder.com/data/icons/F-I-P-by-Delacro/128/dll.png)
0replies
3voices
286views
3 replies have been removed
You must be logged in to reply to this discussion. Login
1 of 1

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.

Dismiss