Microsoft Windows Authenticated User...

- AV AC AU C I A
发布: 2009-11-26
修订: 2025-04-13

This Metasploit module uses a valid administrator username and password (or password hash) to execute an arbitrary payload. This Metasploit module is similar to the "psexec" utility provided by SysInternals. Unfortunately, this module is not able to clean up after itself. The service and payload file listed in the output will need to be manually removed after access has been gained. The service created by this tool uses a randomly chosen name and description, so the services list can become cluttered after repeated exploitation.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息