This Metasploit module allows an attacker with an unprivileged windows account to gain admin access on windows system and start a shell. For this module to work, both the NSClient++ web interface and ExternalScripts features must be enabled. You must also know where the NSClient config file is, as it is used to read the admin password which is stored in clear text.

You May Also Like

The source code of the Paradise Ransomware was leaked on XSS hacking forum

The source code for the Paradise Ransomware has been released on a…

FBI Agents Secretly to Delete Malicious Web Shells From Hacked Microsoft Exchange Servers

The US Department of Justice (DoJ) announced Tuesday that FBI agents carried…