*] Sending stage (2650 bytes)
[*] Sleeping before handling stage...
[*] Uploading DLL (75787 bytes)...
[*] Upload completed.
[*] Meterpreter session 1 opened (192.168.*.*:52376 -> 192.168.*.*:27991)
[-] Exploit failed: Connection reset by peer
General discussion of ethical hacking concepts, experiences, ideas and certs.
The Windows payload stagers have been updated to support targets with
NX CPU support. These stagers now allocate a read/write/exec segment of
memory for all payload downloads and execution.
viruz wrote:Also i was thinking if it could be possible to pop up the internet explorer from the shell, i ran explorer.exe but nothing happened, but if i run the same explorer.exe while im sitting on the system it pops up the explorer page...what do you think may be wrong?
Users browsing this forum: No registered users and 2 guests