Adobe Vulnerability Tutorial

June 16, 2011 by Andrew Whitaker

In this video, we will demonstrate the adobe_utilprintf exploit. We will show how to set up a PDF within Metasploit that will deliver an exploit via an HTML link. That exploit will have a victim connect back to you with a reverse TCP connection to shell.

Once connected, we will demonstrate some of the basic commands within Meterpreter, such as:

  • Migrating to another process
  • Elevate priviledge
  • View and dump password hashes
  • Capturing screenshots
  • Launching the keystroke logger

Enjoy the video

Posted: June 16, 2011
Andrew Whitaker
View Profile

Andrew Whitaker is a Senior Instructor for both the InfoSec Institute and the Intense School. He is also a nationally recognized expert on information security. He has performed penetration tests on numerous financial institutions throughout the United States and has been a regular consultant to government agencies on cyber security.He is also the author of several best-selling security and networking books, including "Penetration Testing and Network Defense" (Cisco Press), "Cisco Router Configuration Handbook" (Cisco Press), and "Chained Exploits: Advanced Hacking Attacks From Start to Finish" (Addison-Wesley). He is also a frequent conference speaker and has given talks on ethical hacking at Defcon, Chicagocon, SecurePhilly, and TakeDownCon. Whitaker also holds a Master’s Degree in Computer Science. He has trained the military, government defense contractors, and intelligence agencies on cyber security, risk management, ethical hacking, reverse engineering and exploit development.