Exploitation using Metasploit
Attackers can compromise target machine by sending malicious PDF.
The PDF created by this process can be easily detected by modern Windows built-in antivirus. So this exploitation may be not useful for attackers.
1. Create a PDF
Attackers can create a malicious PDF using metasploit.
2. Send PDF to Target Machine
After creating a PDF, attackers need to send it to target user. There are various ways to do that. For example,
Host the PDF in attacker’s website.
Send an email with this PDF attached.
3. Start Listener in Attacker’s Machine
To receive incoming connection from target machine, attackers start a listener in their machine.
4. Reverse Shell
When a victim open the PDF using Adobe Reader, this file starts a reverse shell to connect the attacker’s machine. After that, attackers can control the victim’s machine in their terminal.
Last updated