In this video, we will demonstrate the adobe_utilprintf exploit. We will show how to set up a PDF within Metasploit that will deliver an exploit via an HTML link. That exploit will have a victim connect back to you with a reverse TCP connection to shell.
Once connected, we will demonstrate some of the basic commands within Meterpreter, such as:
- Migrating to another process
- Elevate priviledge
- View and dump password hashes
- Capturing screenshots
- Launching the keystroke logger
Enjoy the video