Executing Metasploit & Empire Payloads from MS Office Document Properties (part 1 of 2)
As a penetration tester I’m always excited to see new and creative methods on creating weaponized MS Office documents. This blog post builds on the following findings published by Black…