Client Side Exploitation
◾
213
Step 7
—Next, we need to enter the IP of our payload listener followed by the port on which
our listener would run. The IP address would be the same as of our BackTrack box. You can
choose the port of your choice. Just make sure that no other service is running on that port.
Step 8
—Finally, the SET will ask us if we would like to enable the listener, so it can start listen-
ing to incoming connections. Choose “Yes” and it would start the reverse handler on the
port that we specified.
Once the victim runs the PDF file, you will receive a reverse connection to your
BackTrack box.
So now you can see how easy it is to create malicious PDF files with SET.
That concludes our discussion on hacking with PDF. Many pentesters ignore PDF exploits
thinking they are useless. These hackers really don’t know what PDF exploits are capable of.
According to me, PDF exploitation is one of the best client side exploitation techniques.
Dostları ilə paylaş: