Home page logo

metasploit logo Metasploit mailing list archives

PXE exploitation
From: "5.K1dd" <5.k1dd () austinhackers org>
Date: Thu, 09 Jun 2011 14:05:19 -0500

The aux module pxexploit looks pretty handy.  If you know a particular
box is pxe enabled, DoS to force a reboot and connection to a malicious
pxe server.  Simply setting up a mal-pxe server and waiting for someone
to connect is somewhat less useful.  Anyone know if there is an
automated way to find out which PCs are setup for pxe boot?  Is that
something that is reported in WMI perhaps?


  By Date           By Thread  

Current thread:
  • PXE exploitation 5.K1dd (Jun 09)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]