SettingContent-MS-File-Execution
SettingContent-MS-File-Execution copied to clipboard
SettingContent-MS File Execution vulnerability in Windows 10
SettingContent-MS-File-Execution
SettingContent-MS File Execution vulnerability in Windows 10 <BR /> Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10 <BR /> Download and execute LoadWebsite.SettingContent-MS <BR /> Website will automatically load Internet Explorer, load a specific site and maximize the screen. This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload <BR /> Vulnerability first discovered by Matt Nelson <BR /> Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
Created by: Brad Voris<BR />
Connect with me at
<IMG SRC="https://github.com/bvoris/bvoris/blob/master/twitter.jpg" WIDTH=10% HEIGHT=10% ALIGN=LEFT>
<BR /><BR /> <BR /><BR />
<A HREF="https://www.victimoftechnology.com">Victim Of Technology<A /> <BR /><BR /> <A HREF="https://www.cyberforgesecurity.com">Cyber Forge Security, Inc.<A /> <BR /><BR />