Microsoft Word Pentesting
Follina MSDT (CVE-2022-30190)
Microsoft Support Diagnostic Tool (MSDT) is vulnerable with Follina.
1. Download the Payload in Local Machine
Clone the payload from msdt-follina.
2. Create the Maldoc in Local Machine
Then a new maldoc named “follina.doc” will be created in the current directory.
Now you’ve started the web server.
3. Open Another Web Server in Local Machine
Open another terminal and move to the msdt-follina directory, then start web server to transfer the maldoc to target machine.
4. Transfer the Maldoc to Target Machine
In target Windows machine, open powershell and execute the following command.
5. Open the Maldoc
In target machine, open the maldoc you transfered.
6. Check the Process Explorer of Sysinternals in Target Machine
Find interesting processes in the Process Explorer.
7. Check the Event Viewer in Target Machine to Detect Suspicious Processes
-
Go to "View" -> "Use Quick Filter"
-
A search bar should appear on top of the logs. Choose “Find Event ID” on the right of the search bar, and enter “4688”(it means that “a new process has been created”) in a search bar.
-
Open the Find (Ctrl+F) and enter “winword”. Then check the contents of results.
-
Go to Options → Advanced Options
-
Reverse Shell via SMTP
If the target uses SMTP, you may be able to reverse shell using it.
Start the exploit to wait for reverse connections.Send e-mail to the target machine via SMTP using swaks.