Drop into IRB:
meterpreter > irb
[*] Starting IRB shell
[*] The 'client' variable holds the meterpreter client
>>
Then paste in the following, replacing the KB identifiers at the end with the desired ones.
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| # | |
| # jarvis.py | |
| # | |
| # Redistribution and use in source and binary forms, with or without | |
| # modification, are permitted provided that the following conditions are | |
| # met: | |
| # | |
| # * Redistributions of source code must retain the above copyright |
Drop into IRB:
meterpreter > irb
[*] Starting IRB shell
[*] The 'client' variable holds the meterpreter client
>>
Then paste in the following, replacing the KB identifiers at the end with the desired ones.
| #compdef msfconsole | |
| # ------------------------------------------------------------------------------ | |
| # Copyright (c) 2014 Spencer McIntyre | |
| # All rights reserved. | |
| # | |
| # Redistribution and use in source and binary forms, with or without | |
| # modification, are permitted provided that the following conditions are met: | |
| # * Redistributions of source code must retain the above copyright | |
| # notice, this list of conditions and the following disclaimer. | |
| # * Redistributions in binary form must reproduce the above copyright |
| import base64 | |
| import hashlib | |
| import hmac | |
| host_id = '11111111-2222-3333-4444-555555555555' | |
| host_secret_hash = 'hmac:TI/gifEUGbMsEhiZSLY0PcTX4xyPzpvcb7b6seOhOYc=' | |
| secret_pin = '123456' | |
| if 'hmac:' + base64.b64encode(hmac.new(host_id, secret_pin, hashlib.sha256).digest()) == host_secret_hash: | |
| print('[+] secret hashes match!') |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| # | |
| # safeseh_inspect.py | |
| # | |
| # Copyright 2014 Spencer McIntyre | |
| # | |
| # Redistribution and use in source and binary forms, with or without | |
| # modification, are permitted provided that the following conditions are | |
| # met: |
| require "json" | |
| require "rex/ui" | |
| module Msf | |
| class Plugin::ModuleSuggestor < Msf::Plugin | |
| class ModuleSuggestorCommandDispatcher | |
| include Msf::Ui::Console::CommandDispatcher | |
| def name | |
| "Module Suggestor" |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| # | |
| # tools/cli_mailer.py | |
| # | |
| # Redistribution and use in source and binary forms, with or without | |
| # modification, are permitted provided that the following conditions are | |
| # met: | |
| # | |
| # * Redistributions of source code must retain the above copyright |
| [BITS 32] | |
| ; This shellcode is meant to be executed in the kernel just after the token has | |
| ; been stolen. It walks up the stack looking for the first frame which returns | |
| ; to userland and returns into the one just before it. This is presumably | |
| ; nt!KiSystemServicePostCall which will clean up the operation before returning | |
| ; to userland. | |
| ; This shell code clobbers ecx, ebx and sets eax to 0 for the return value. |
I hereby claim:
To claim this, I am signing this object:
| require 'msf/core' | |
| require 'rex' | |
| lib = File.join(Msf::Config.install_root, "test", "lib") | |
| $:.push(lib) unless $:.include?(lib) | |
| require 'module_test' | |
| class Metasploit4 < Msf::Post |