Quantcast
Channel: Pax Pentest » Meterpreter
Browsing all 19 articles
Browse latest View live

Metasploit: Exploiting MS SQL Server: Fast-Track, mssql_ping, mssql_login,...

I’m targeting the MS MSQL Server on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 6 (Meterpreter) of Metasploit: The Penetration Tester’s Guide. The...

View Article



Image may be NSFW.
Clik here to view.

Metasploit Meterpreter Shell: Screenshot, sysinfo, ps, migrate, keylog_recorder

This post follows on from the previous post within which a target machine was exploited and a Meterpreter shell obtained. First to export an image of the target machine’s desktop: meterpreter >...

View Article

Metasploit Meterpreter: Dumping Username and Password Hashes – hashdump

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Creating a new user in an exploited Windows XP System

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit Meterpreter: Using ps and stealing Kerberos tokens

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Run VNC

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Sniffing traffic on exploited system – Packetrecorder

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit Meterpreter: Creating a persistent backdoor connection

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Metasploit Meterpreter: Migrate a process and obtain system password hashes

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Metasploit Meterpreter: Killing Antivirus Software on Exploited System – Killav

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit: Listing Meterpreter Post Exploitation Modules

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter Railgun: Post Exploit Windows API Manipulation

Metasploit: The Penetration Tester’s Guide has this to say about Railgun: You can interface with the Windows native API directly through a Metasploit add-on called Railgun. [....] Railgun gives you the...

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Internet Explorer “Aurora” Memory Corruption...

I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...

View Article


Metasploit Meterpreter: MS11-006 Client-Side Malicious Document Exploit –...

I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...

View Article

Image may be NSFW.
Clik here to view.

Metasploit: My First Successful Armitage Exploit

I just completed my first successful exploit in the marvellous Metasploit GUI Armitage. Details of the target machine on my Virtual Hacking Lab: Windows XP Pro Service Pack 2 (unpatched). Firewall and...

View Article


Image may be NSFW.
Clik here to view.

Seting up a simple backdoor shell using Ncat via Metasploit Armitage

First I exploited my Windows system with Metasploit Armitage obtaining a Meterpreter shell as per this post. Then I needed to upload the ncat.exe file (which I download from here) to the target...

View Article

Image may be NSFW.
Clik here to view.

Creating a persistent Ncap backdoor in Windows XP startup using Metasploit

I couldn’t figure out how to do this in Armitage and so had to resort to the good ol’ Terminal. I exploited the XP system as per this post and obtained an Meterpreter shell. First to upload the...

View Article


Metasploitable 2: Java RMI (Remote Method Invocation) Server

The Nmap scan of Metasploitable 2 revealed: PORT      STATE SERVICE     VERSION 1099/tcp  open  rmiregistry GNU Classpath grmiregistry From Wiki: The Java Remote Method Invocation (Java RMI) is a Java...

View Article

Metasploitable 2: Port 5432 – PostgreSQL

The Nmap scan of Metasploitable 2 revealed: PORT      STATE SERVICE     VERSION 5432/tcp  open  postgresql  PostgreSQL DB 8.3.0 – 8.3.7 This exploit is straight forward brute force using Metasploit:...

View Article
Browsing all 19 articles
Browse latest View live




Latest Images