![]() I watched your video and instructions and did exactly the same psexec command. In order t exploit this vulnerability you need to access some PHP file of the web server without sending parameters (specially without sending the character "="). ![]() Source: Rapid7 Bad times for RDP connections. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |