Kwelwild Posted April 14, 2013 Report Posted April 14, 2013 http://www.youtube.com/watch?feature=player_embedded&v=c-9IIfgVgCcDescription: This exploit will present malicious files on a server and once we entice the victim to visit ourserver and open our file he will be injected with our malicious dll and we can have our payload running.The webdav dll hijacker is located at exploits/windows/browser/webdav_dll_hijacking. Next set your payload as a windows/meterpreter/reverse_tcp and set the local host and the local port. In here I used the extension as ppt. Well once you enter exploit metasploit will start the server and once the victim visits our server he should see a powerpoint presentation in our case. When he opens it we should get our payload working.To learn more about DLL security read this: Dynamic-Link Library Security (Windows)Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.Original Source: WebDAV DLL Hijacking - YouTubeSursa: Webdav Dll Hijacking Tutorial Quote