Executing Metasploit & Empire Payloads from MS Office Document Properties (part 2 of 2)
Building on from my previous post, this will primarily focus on delivering an Empire payload via an embedded offensive PowerShell script stored within the ‘comments’ property of an MS Excel…