Skip to content

Welcome to the msf auxiliarys wiki!

pedro ubuntu edited this page Feb 17, 2019 · 25 revisions

Description

This working directory contains diferent metasploit auxiliary modules
writen by me to be of assistence in post-exploitation common tasks.

Post-Module Limitations

1º - Its a post-exploitation module (it requires one open session)
2º - It only runs in meterpreter sessions (does not run in shell sessions)
3º - Some of the modules need elevated privileges to run (nt authority/system)
     'Privileged'  => 'true' # requires elevated privileges to run

How to install them

1º - Download module from github
2º - edit module to read the description,
3º - port module to metasploit database
4º - reload metasploit database (msf > reload_all)
     'reload its only needed the first time we port the module'

reload metasploit database

1º - service postgresql start
2º - msfdb reinit
3º - msfconsole -x 'db_status;reload_all;exit -y'

Metasploit db upload path (kali)

/usr/share/metasploit-framework/modules/post/windows/[???]/[module_name].rb
"edit each post-module and read the instructions to learn more about module"

Runing Post-Module

It all starts in 'backgrounding' current open session

1º - meterpreter > background
2º - msf exploit(handler) > use post/windows/escalate/NO-IP_service_backdoor
3º - msf post(NO-IP_service_backdoor) > info
4º - msf post(NO-IP_service_backdoor) > show options
5º - msf post(NO-IP_service_backdoor) > show advanced options
6º - msf post(NO-IP_service_backdoor) > set [option(s)]
7º - msf post(NO-IP_service_backdoor) > exploit

class constant error

This is the common error ppl might encounter with. nothing wrong with module.
The reason its because you are using an old version of metasploit, So replace
the class name to the default class name your MSF install is using...
( Current one is: class MetasploitModule < Msf::Post )

Bug Reports (issues)

If you are facing any bugs, please describe it here



_EOF