Description: this video is a simple demo of vulnerability that occurs when a user presses F1 on MessageBox originated from VBscript within a web page.
When the user hits F1, the MessageBox help functionaility will attempt to load and use a HLP file from an SMB or WebDAV (if the WebDAV redirector is enabled) server. This particular version of the exploit implements a WebDAV server that will serve HLP file as well as a payload EXE. During testing warnings about the payload EXE being unsigned were witnessed. A future version of this module might use other methods that do not create such a warning
Tags: metasploit , ie ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
If you see this exploit code so its very simple code but see the simple code exploitation power LOL !!!
please continue the demos of exploits with metasploit.