Internet Explorer CSS recursive call memory corruption
This is one of the most recent exploits available for the Windows platform running IE browser. This exploit is known to affect Windows 7 and Windows 2008 server with IE 8 as the default browser. The working process of this exploit is similar to the one we just discussed in the previous recipe. So let us quickly test it. Our target machine is a Windows 7 ultimate edition with IE 8 (unpatched) running as the default browser.
Getting ready
We will start with launching the msfconsole. Our exploit in this recipe is exploit/windows/browser/ms11_003_ie_css_import
and our payload will be windows/meterpreter/bind_tcp
which will help in gaining shell connectivity with the target machine.
How to do it...
We will start the same way we have been doing so far. First, we will select the exploit. Then, we will select the payload and pass on the various parameter values required by the exploit and the payload. Let us move ahead with all these steps in...