Skip to content

Commit 19e8827

Browse files
carlospolopgitbook-bot
authored andcommitted
GITBOOK-4330: No subject
1 parent fe11b16 commit 19e8827

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

pentesting-web/formula-csv-doc-latex-ghostscript-injection.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
1616

1717
**Try Hard Security Group**
1818

19-
<figure><img src="/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
19+
<figure><img src="../.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
2020

2121
{% embed url="https://discord.gg/tryhardsecurity" %}
2222

@@ -75,7 +75,7 @@ In specific configurations or older versions of Excel, a feature called Dynamic
7575
When a spreadsheet with the malicious payload is opened (and if the user accepts the warnings), the payload is executed. For example, to launch the calculator application, the payload would be:
7676

7777
```markdown
78-
`=cmd|' /C calc'!xxx`
78+
=cmd|' /C calc'!xxx
7979
```
8080

8181
Additional commands can also be executed, such as downloading and executing a file using PowerShell:
@@ -219,7 +219,7 @@ From [@EdOverflow](https://twitter.com/intigriti/status/1101509684614320130)
219219

220220
**Try Hard Security Group**
221221

222-
<figure><img src="/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
222+
<figure><img src="../.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
223223

224224
{% embed url="https://discord.gg/tryhardsecurity" %}
225225

0 commit comments

Comments
 (0)