-
Notifications
You must be signed in to change notification settings - Fork 82
Welcome to the msf auxiliarys wiki!
pedro ubuntu edited this page Feb 17, 2019
·
25 revisions
This working directory contains diferent metasploit auxiliary modules
writen by me to be of assistence in post-exploitation common tasks.
1º - Its a post-exploitation module (it requires one open session)
2º - It only runs in meterpreter sessions (does not run in shell sessions)
3º - Some of the modules need elevated privileges to run (nt authority/system)
'Privileged' => 'true' # requires elevated privileges to run
1º - Download module from github
2º - edit module to read the description,
3º - port module to metasploit database
4º - reload metasploit database (msf > reload_all)
'reload its only needed the first time we port the module'
1º - service postgresql start
2º - msfdb reinit
3º - msfconsole -x 'db_status;reload_all;exit -y'
/usr/share/metasploit-framework/modules/post/windows/[???]/[module_name].rb
"edit each post-module and read the instructions to learn more about module"
It all starts in 'backgrounding' current open session
1º - meterpreter > background
2º - msf exploit(handler) > use post/windows/escalate/NO-IP_service_backdoor
3º - msf post(NO-IP_service_backdoor) > info
4º - msf post(NO-IP_service_backdoor) > show options
5º - msf post(NO-IP_service_backdoor) > show advanced options
6º - msf post(NO-IP_service_backdoor) > set [option(s)]
7º - msf post(NO-IP_service_backdoor) > exploit
This is the common error ppl might encounter with. nothing wrong with module.
The reason its because you are using an old version of metasploit, So replace
the class name to the default class name your MSF install is using...
( Current one is: class MetasploitModule < Msf::Post )
If you are facing any bugs, please describe it here
_EOF