Exploiting Samba Server with Root privilege access.
CVE 2007-2447
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
Hola,
sigo los pasos del video, pero al ejecutar el exploit, la respuesta es:
Exploit completedbut no session was created.
La maquina victima comparte recursos. No se si será problema del LHOST...
Alguna idea