Пора ему дать "ходу" в паблик, эту поделку переодически продают по форумам, оно того не стоит совершенно, там целая куча условий для его запуска.
Колупайтесь!
xttps://temp.sh/FXmrU/VeeamExploit.rar
1. Run SMB-Disable.bat as Administrator, after reboot OS!. (This script will disable internal services that use 445 port, this will permit to use custom app "Redfish" to share files).
2. Run Redfish.exe, configure as in picture redfish.png and press start.
3. in shared folder "C:\a" (or other path), put your payload.
4. Edit VeeamExploit\exploit\compiled\1. exec.bat acording your environment
5. Edit VeeamExploit\exploit\compiled\2. copy.bat (change only IP and port).
6. Edit VeeamExploit\exploit\compiled\3. reboot.bat acording your environment.
7. Edit "C:\temp\exec.txt" (change only IP and shared folder name).
Put folder "temp" in "C:\".
Hint. To check if target is vulnerable, you can execute reboot, and ping target, if ping lost, then target is vulnerable.
Execute (Order is important!).
8. VeeamExploit\exploit\compiled\1. exec.bat
9. VeeamExploit\exploit\compiled\2. copy.bat
10. VeeamExploit\exploit\compiled\3. reboot.bat
if all ok, target will be rebooted, you can monitor using "ping targetip -t".
After reboot, when any of user will be logged in,your payload will be executed as logged user privileges.
Колупайтесь!
xttps://temp.sh/FXmrU/VeeamExploit.rar
1. Run SMB-Disable.bat as Administrator, after reboot OS!. (This script will disable internal services that use 445 port, this will permit to use custom app "Redfish" to share files).
2. Run Redfish.exe, configure as in picture redfish.png and press start.
3. in shared folder "C:\a" (or other path), put your payload.
4. Edit VeeamExploit\exploit\compiled\1. exec.bat acording your environment
5. Edit VeeamExploit\exploit\compiled\2. copy.bat (change only IP and port).
6. Edit VeeamExploit\exploit\compiled\3. reboot.bat acording your environment.
7. Edit "C:\temp\exec.txt" (change only IP and shared folder name).
Put folder "temp" in "C:\".
Hint. To check if target is vulnerable, you can execute reboot, and ping target, if ping lost, then target is vulnerable.
Execute (Order is important!).
8. VeeamExploit\exploit\compiled\1. exec.bat
9. VeeamExploit\exploit\compiled\2. copy.bat
10. VeeamExploit\exploit\compiled\3. reboot.bat
if all ok, target will be rebooted, you can monitor using "ping targetip -t".
After reboot, when any of user will be logged in,your payload will be executed as logged user privileges.
