Veritas Backup Exec Server Registry Access
This modules exploits a remote registry access flaw in the BackupExec Windows Server RPC service. This vulnerability was discovered by Pedram Amini and is based on the NDR stub information information posted to openrce.org. Please see the action list for the different attack modes.
- hdm <x [at] hdm.io>
- System Information
- Create Logon Notice
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use auxiliary/admin/backupexec/registry msf auxiliary(registry) > show actions ...actions... msf auxiliary(registry) > set ACTION <action-name> msf auxiliary(registry) > show options ...show and set options... msf auxiliary(registry) > run