I hereby claim:
- I am wchen-r7 on github.
- I am wchenr7 (https://keybase.io/wchenr7) on keybase.
- I have a public key whose fingerprint is D20B 6DC3 3C6B 7252 71A2 258E 2384 DB4E F06F 730B
To claim this, I am signing this object:
$ msfconsole | |
msf > set rhost 192.168.1.148 | |
rhost => 192.168.1.148 | |
msf > use exploit/windows/smb/ms08_067_netapi | |
msf exploit(ms08_067_netapi) > show options | |
Module options (exploit/windows/smb/ms08_067_netapi): | |
Name Current Setting Required Description | |
---- --------------- -------- ----------- |
msf > workspace -a demo_for_steve | |
[*] Added workspace: demo_for_steve | |
msf > hosts -a "192.168.1.200" <---- Say you wanna modify this host's name and comments | |
[*] Time: 2015-03-07 19:58:45 UTC Host: host=192.168.1.200 | |
msf > irb | |
[*] Starting IRB shell... | |
>> id = framework.db.get_host(:address => '192.168.1.200').id | |
=> 488 | |
>> framework.db.hosts.update(id, :comments => "This is a new comment") |
I hereby claim:
To claim this, I am signing this object:
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit4 < Msf::Exploit::Remote | |
Rank = GreatRanking |
<ruby> | |
def add_hosts | |
run_single("hosts -a -R 192.168.1.2-192.168.1.20") | |
Rex::Socket::RangeWalker.new("192.168.1.2-192.168.1.20").each do |ip| | |
id = framework.db.get_host(:address => ip).id | |
framework.db.hosts.update(id, :os_name => 'Microsoft Windows') | |
framework.db.hosts.update(id, :os_flavor => 'Windows 7') | |
framework.db.hosts.update(id, :os_sp => 'SP1') |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = NormalRanking |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
Rank = NormalRanking |
$ ruby msfd | |
[*] Initializing msfd... | |
[*] Running msfd... | |
$ nc 127.0.0.1 55554 | |
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM | |
MMMMMMMMMMM MMMMMMMMMM | |
MMMN$ vMMMM | |
MMMNl MMMMM MMMMM JMMMM | |
MMMNl MMMMMMMN NMMMMMMM JMMMM |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
include Msf::Exploit::Remote::HttpClient | |
def initialize(info = {}) | |
super(update_info(info, | |
'Name' => 'HttpClient Example', | |
'Description' => %q{ Do a send_request_cgi() }, |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
include Msf::Auxiliary::Report |