-
Notifications
You must be signed in to change notification settings - Fork 13.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ability to use bind payloads with wmi and current_user_psexec #3937
Comments
Seems to still be an issue, nearly 10 years later:
|
adfoster-r7
added
the
attic
Older submissions that we still want to work on again
label
Apr 25, 2023
Thanks for your contribution to Metasploit Framework! We've looked at this issue, and unfortunately we do not currently have the bandwidth to prioritize this issue. We've labeled this as |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
This issue was RM8694, originally filed by by @rsmudge
I love windows/local/current_user_psexec and windows/local/wmi. I noticed though that I can't use bind payloads with these modules.
Sometimes, I'll capture an admin token or creds and need to take control of a system that can't stage to the internet. I usually use psexec_command to drop the firewall and then deliver a bind payload. It'd be nice if these modules supported this workflow.
The text was updated successfully, but these errors were encountered: