Skip to content

Instantly share code, notes, and snippets.

View wchen-r7's full-sized avatar

sinn3r wchen-r7

View GitHub Profile
$ msfconsole
msf > set rhost 192.168.1.148
rhost => 192.168.1.148
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > show options
Module options (exploit/windows/smb/ms08_067_netapi):
Name Current Setting Required Description
---- --------------- -------- -----------
msf > workspace -a demo_for_steve
[*] Added workspace: demo_for_steve
msf > hosts -a "192.168.1.200" <---- Say you wanna modify this host's name and comments
[*] Time: 2015-03-07 19:58:45 UTC Host: host=192.168.1.200
msf > irb
[*] Starting IRB shell...
>> id = framework.db.get_host(:address => '192.168.1.200').id
=> 488
>> framework.db.hosts.update(id, :comments => "This is a new comment")

Keybase proof

I hereby claim:

  • I am wchen-r7 on github.
  • I am wchenr7 (https://keybase.io/wchenr7) on keybase.
  • I have a public key whose fingerprint is D20B 6DC3 3C6B 7252 71A2 258E 2384 DB4E F06F 730B

To claim this, I am signing this object:

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit4 < Msf::Exploit::Remote
Rank = GreatRanking
<ruby>
def add_hosts
run_single("hosts -a -R 192.168.1.2-192.168.1.20")
Rex::Socket::RangeWalker.new("192.168.1.2-192.168.1.20").each do |ip|
id = framework.db.get_host(:address => ip).id
framework.db.hosts.update(id, :os_name => 'Microsoft Windows')
framework.db.hosts.update(id, :os_flavor => 'Windows 7')
framework.db.hosts.update(id, :os_sp => 'SP1')
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
Rank = NormalRanking
$ ruby msfd
[*] Initializing msfd...
[*] Running msfd...
$ nc 127.0.0.1 55554
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMM MMMMMMMMMM
MMMN$ vMMMM
MMMNl MMMMM MMMMM JMMMM
MMMNl MMMMMMMN NMMMMMMM JMMMM
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'HttpClient Example',
'Description' => %q{ Do a send_request_cgi() },
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Auxiliary::Report