Scanning and Enumeration
Last updated
Was this helpful?
Last updated
Was this helpful?
Researching this vulnerability we are going to have to do the following:
Configure exploit to connect to a port on our attack machine
Set up an httpserver with nc.exe running
set up our listening
Run the python code
This exploit will grab the nc.exe from our server (port 80) execute it and run it and connect it to our attack machine. Further research of the exploit can be found here: