EXIFTOOL

RCE

Run the exploit on the attacking machine, this will create an image that contains the exploit

-c use a custom command

-s use a rev shell [IP] [PORT]

Run a listener on the attack machine

Download onto the victim machine

Last updated