Sept. 21, 2022, 1:50 p.m. |

Packet Storm packetstormsecurity.com

This Metasploit module utilizes the Unified Remote remote control protocol to type out and deploy a payload. The remote control protocol can be configured to have no passwords, a group password, or individual user accounts. If the web page is accessible, the access control is set to no password for exploitation, then reverted. If the web page is not accessible, exploitation will be tried blindly. This module has been successfully tested against version 3.11.0.2483 (50) on Windows 10.

authentication authentication bypass bypass code code execution

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Specialist

@ Lely | Maassluis, Netherlands

IT Security Manager (Corporate Security) (REF822R)

@ Deutsche Telekom IT Solutions | Budapest, Hungary

Senior Security Architect

@ Cassa Centrale Banca - Credito Cooperativo Italiano | Trento, IT, 38122

Senior DevSecOps Engineer

@ Raft | Las Vegas, NV (Remote)

Product Manager - Compliance

@ Arctic Wolf | Remote - Colorado