I have a box sitting next to me running XP that is vulnerable to the messenger service exploit.
I have compiled an exploit and ran it against the machine. Appearently the exploit creates user: X and pass: X.
How then, after running the exploit, am I able to compromise the machine? My goal here is to upload and execute a file. Please help! Thank you.