NSClient++ 0.5.2.35 Privilege Escalation
Posted by deepcore on July 7, 2021 – 2:06 am
This Metasploit module allows an attacker with an unprivileged windows account to gain admin access on windows system and start a shell. For this module to work, both the NSClient++ web interface and ExternalScripts features must be enabled. You must also know where the NSClient config file is, as it is used to read the admin password which is stored in clear text.
Post a reply
You must be logged in to post a comment.