ExploitCapcom icon indicating copy to clipboard operation
ExploitCapcom copied to clipboard

Question about metasploit

Open ghost opened this issue 4 years ago • 2 comments

the only capcom related exploit of metasploit is this https://www.rapid7.com/db/modules/exploit/windows/local/capcom_sys_exec/

is it possible to add a meterpreter payload to this exploit? for example when I compile and run this exploit I get a cmd (SYSTEM) from windows, so instead of running the windows cmd, how do i get it to run a meterpreter payload?

ghost avatar Jun 18 '21 18:06 ghost

Actually there's no difference between this repo and exploit/windows/local/capcom_sys_exec since both does privilege elevation. Therefore I don't see any reason to make meterpreter payload for this repo, am I wrong?

kkent030315 avatar Jun 23 '21 18:06 kkent030315

Actually there's no difference between this repo and exploit/windows/local/capcom_sys_exec since both does privilege elevation. Therefore I don't see any reason to make meterpreter payload for this repo, am I wrong?

hello it's me, what i meant is if you could update this one: https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/local/capcom_sys_exec.rb

You said that there is no difference between the two, but the only one that works is this one, what I mentioned above doesn't work, I wanted to use the meterprer payload, understand? I tested both on windows 11, metasploit doesn't work, only this one

gabriel-maxx avatar Oct 18 '21 17:10 gabriel-maxx