Subscribe via feed.

Microsoft Excel .SLK Payload Delivery

Posted by deepcore on February 13, 2019 – 3:00 pm

This Metasploit module generates a download and execute Powershell command to be placed in an .SLK Excel spreadsheet. When executed, it will retrieve a payload via HTTP from a web server. When the file is opened, the user will be prompted to “Enable Content.” Once this is pressed, the payload will execute.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.