Metasploit

REF:

Metasploit Framework

msfsearch whatever

msfconcole
search Nostromo
use exploit/multi/http/nostromo_code_exec
show options

Format:
Exploit/Payload/Auxiliary/PostModules

Eternal Blue

ms08_067_netapi.rb
  .. eternal blue - messy, memory, could crash system
  .. get out of this as soon as you can and use psexec

ms17_010_psexec.rb   ..eternal blue - friendly version
  .. sends a file, authenticates nicely, runs that file as service
  .. Pentesters Pledge!!

Venom

  • Silly Windows Powershell "Hello":

    • Create "hi.exe"

    • Opens Windows Powershell

    • Prints "Hello World"

Listener

Sessions

Shell

PrivEsc

Meterpreter

Migrate

Looking Around

Pivot

Pass the Hash

  • Pass the HASH to Metasploit

  • Must come from: system, ram, sam-db, ntds.dit

  • Not sniffed from the network (diff salts)

  • Note: Patch in 2014 Local account is now disabled over network

Last updated

Was this helpful?