To open a new meterpreter session using the exchange_proxyshell_rce
exploit in ruby, follow these steps:
First, setup the Metasploit framework on your system and run it.
Next, load the exploit/multi/http/exchange_proxyshell_rce
module by running the following command in the Metasploit console:
main.rb54 chars2 lines
Set the values of RHOST
, RPORT
and TARGETURI
options as per the target environment. For example:
main.rb228 chars4 lines
Set the PAYLOAD
option to windows/meterpreter/reverse_https
, as this payload will create a new meterpreter session for us:
main.rb97 chars2 lines
Configure the payload options such as LHOST
and LPORT
to connect back to your attacker machine:
main.rb152 chars3 lines
Finally, run the exploit using the exploit
command:
main.rb59 chars2 lines
If the exploit is successful, you should see a new meterpreter session opened in your Metasploit console.
gistlibby LogSnag