Open ghost opened 3 years ago
Actually there's no difference between this repo and exploit/windows/local/capcom_sys_exec since both does privilege elevation. Therefore I don't see any reason to make meterpreter payload for this repo, am I wrong?
Actually there's no difference between this repo and exploit/windows/local/capcom_sys_exec since both does privilege elevation. Therefore I don't see any reason to make meterpreter payload for this repo, am I wrong?
hello it's me, what i meant is if you could update this one: https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/local/capcom_sys_exec.rb
You said that there is no difference between the two, but the only one that works is this one, what I mentioned above doesn't work, I wanted to use the meterprer payload, understand? I tested both on windows 11, metasploit doesn't work, only this one
the only capcom related exploit of metasploit is this https://www.rapid7.com/db/modules/exploit/windows/local/capcom_sys_exec/
is it possible to add a meterpreter payload to this exploit? for example when I compile and run this exploit I get a cmd (SYSTEM) from windows, so instead of running the windows cmd, how do i get it to run a meterpreter payload?