Skip to content

Commit 5db1d95

Browse files
committed
Update doc
1 parent 6e692b1 commit 5db1d95

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

documentation/modules/exploit/windows/fileformat/office_word_macro.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,11 @@ Specifically, this module was tested specifically against:
3737

3838
## Demo
3939

40+
In this example, first we generate the malicious docm exploit, and then we set up a
41+
windows/meterpreter/reverse_tcp handler to receive a session. Next, we copy the docm
42+
exploit to a Windows machine with Office 2013 installed, when the document runs the
43+
macro, we get a session:
44+
4045
![macro_demo](https://cloud.githubusercontent.com/assets/1170914/22602348/751f9d66-ea08-11e6-92ce-4e52f88aaebf.gif)
4146

4247
## Modification

0 commit comments

Comments
 (0)