I am trying to achieve root on a free windows box right now. I have set up an environment locally to test a buffer overflow against a vulnerable service.
The exploit I found (on exploitdb) for the service said that it was written for Win7 SP1 x64. The machine I am testing on is Win10 Pro x64. I am currently trying to generate an
windows/x64/messagebox python payload using msfvenom. Upon executing the python script that performs the exploit the vulnerable service crashes, but I see no message box. I am not sure how I go about debugging this script to see what exactly is going on.
I have a suspicion that the way I am executing the payload, it isn't possible to open a message box. I have tried using
windows/x64/shell/reverse_tcp but it doesn't appear as though I can catch that using netcat.