In this video, we will demonstrate the adobe_utilprintf exploit. We will show how to set up a PDF within Metasploit that will deliver an exploit via an HTML link. That exploit will have a victim connect back to you with a reverse TCP connection to shell.

Once connected, we will demonstrate some of the basic commands within Meterpreter, such as:

  • Migrating to another process
  • Elevate priviledge
  • View and dump password hashes
  • Capturing screenshots
  • Launching the keystroke logger

Enjoy the video