Skip to content

Commit 056313e

Browse files
committed
Update doc
1 parent 7ec5ec6 commit 056313e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

documentation/modules/exploit/multi/fileformat/office_word_macro.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ executable when the Office document is launched.
1212

1313
## Vulnerable Application
1414

15-
A Windows machine with Microsoft Office installed. The Office application must support the docm
15+
A Windows or OSX machine with Microsoft Office installed. The Office application must support the docm
1616
format.
1717

1818
Specifically, this module was tested specifically against:
@@ -49,7 +49,7 @@ To use this exploit in a real environment, you will most likely need to modify t
4949
Here's one approach you can do:
5050

5151
1. Use the module to generate the malicious docm
52-
2. Copy the malicious docm to a Windows machine, and edit it with Microsoft Office (such as 2013).
52+
2. Copy the malicious docm to the vulnerable machine, and edit it with Microsoft Office (such as 2013).
5353
When you open the document, the payload will probably do something on your machine. It's ok,
5454
since you generated it, it should not cause any problems for you.
5555
3. Save the doc, and test again to make sure the payload still works.

0 commit comments

Comments
 (0)