Good evening friends. Today we will see how to exploit a Windows 7 system with PDF shaper buffer overflow exploit which exploits a vulnerability in PDF shaper 3.4. To those newbies who don’t know what is PDF shaper, it is a “collection of free PDF tools, which allows you to merge, split, encrypt and decrypt PDFs, convert images to PDF, convert PDF to Word RTF or images, extract text and images from PDF. ”
We will use Kali Linux as the attacker machine for hacking Windows 7. Start Metasploit and search for “pdf shaper” exploit. as shown below.
Copy the exploit path as shown above and load the exploit as shown below. Set the payload as “windows/meterpreter/reverse_tcp”.
Set the IP address of Kali Linux as LHOST. Type command “exploit”. A pdf file will be created as shown below.
We have to send this pdf file to our target. Before that, we will have to start a listener for this specific exploit. Load the following exploit and payload as given in the below image.
Set lhost and lport exactly as same as the values we have given above. Type command “exploit”.
Now send the file to our target. When he uses PDF shaper to convert our pdf to image as shown below
we get a meterpreter session on our attacker system as shown below.