Metasploit mailing list archives
PXE exploitation
From: "5.K1dd" <5.k1dd () austinhackers org>
Date: Thu, 09 Jun 2011 14:05:19 -0500
The aux module pxexploit looks pretty handy. If you know a particular box is pxe enabled, DoS to force a reboot and connection to a malicious pxe server. Simply setting up a mal-pxe server and waiting for someone to connect is somewhat less useful. Anyone know if there is an automated way to find out which PCs are setup for pxe boot? Is that something that is reported in WMI perhaps? Brian _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- PXE exploitation 5.K1dd (Jun 09)