This Metasploit module allows an attacker with an unprivileged windows account to gain admin access on windows system and start a shell. For this module to work, both the NSClient++ web interface and ExternalScripts features must be enabled. You must also know where the NSClient config file is, as it is used to read the admin password which is stored in clear text.
You May Also Like
Brother BRPrint Auditor 3.0.7 Unquoted Service Path
Brother BRPrint Auditor version 3.0.7 suffers from an unquoted service path vulnerability.
- cybersecurityredflag_sdevzw
- June 15, 2021
Colombian Officials Arrested a Romanian Hacker Wanted in the U.S. for Distributing a Virus
Colombian authorities claim to have apprehended a Romanian hacker wanted in the…
- cybersecurityredflag_sdevzw
- June 29, 2021
TrickBot explained: A multi-purpose crimeware tool that haunted businesses for years
What is TrickBot? TrickBot is one of the longest-lived botnets on the…
- cybersecurityredflag_sdevzw
- December 10, 2020
Google PPC Ads Used to Deliver Infostealers
The crooks pay top dollar for Google search results for the popular…
- cybersecurityredflag_sdevzw
- June 3, 2021