So, Can Metasploit Make a Doc File Trojan?
I mean the final file must be with a file extension of ".Doc" , and I want the trojan to be made by myself(not a metasploit one). Can I achieve that with metasploit ?
And another question, how do I find out all the exploits with MS Office? People of course always better use the most new ones,right?