Categorieën
Metasploit

Metasploit tips

systemctl start postgresql
cp /usr/share/exploitdb/exploits/cgi/webapps/42344.rb /root/.msf4/modules/exploits/cgi/webapps/
updatedb

sessions -u
  • search delivery for web payload deliver
  • search autoroute for session routes
  • search smb_version
  • search arp_sweep

Vulnerability Scanning in Metasploit

db_nmap -v --script vuln 192.168.0.184
  • hosts
  • services

Port forwaring

portfwd add –l 3389 –p 3389 –r target-host

Forwards 3389 (RDP) to 3389 on the compromised machine running the Meterpreter shell