Metasploit
REF:
Metasploit Framework
msfsearch whatever
msfconcole
search Nostromo
use exploit/multi/http/nostromo_code_exec
show options
Format:
Exploit/Payload/Auxiliary/PostModulesEternal Blue
ms08_067_netapi.rb
.. eternal blue - messy, memory, could crash system
.. get out of this as soon as you can and use psexec
ms17_010_psexec.rb ..eternal blue - friendly version
.. sends a file, authenticates nicely, runs that file as service
.. Pentesters Pledge!!
Venom
Silly Windows Powershell "Hello":
Create "hi.exe"
Opens Windows Powershell
Prints "Hello World"
Listener
Sessions
Shell
PrivEsc
Meterpreter
Migrate
Looking Around
Pivot
Pass the Hash
Pass the HASH to Metasploit
Must come from: system, ram, sam-db, ntds.dit
Not sniffed from the network (diff salts)
Note: Patch in 2014 Local account is now disabled over network
Last updated
Was this helpful?