Internet Explorer unsafe scripting misconfiguration vulnerability
Let us start with the first browser-based client side exploit. The elementary process of using any client-side exploit module is similar to the ones we discussed in previous chapters. The only difference lies in transferring the exploit to the target. Unlike operating system-based exploits, client-side exploits require manual execution of the exploit and payload at the target machine. You will understand it clearly, once we proceed with the recipe. So let us quickly dive into implementing the attack.
Getting ready
We will start with launching our msfconsole and selecting the relevant exploit. The process is similar to what we have been discussing so far in previous chapters. Then, we will move ahead to select a payload which will help us set a shell connectivity with the target machine. The exploit we will be dealing with in this recipe is exploit/windows/browser/i.e. unsafe scripting
.
Note
This exploit is known to affect Internet...