WebExec Authenticated User Code Execution
Posted by deepcore on October 25, 2018 – 5:11 pm
This Metasploit module uses a valid username and password of any level (or password hash) to execute an arbitrary payload. This Metasploit module is similar to the “psexec” module, except allows any non-guest account by default.
Post a reply
You must be logged in to post a comment.