Tags archives: metasploit

 

 

0

Metasploit RPC Console Command Execution

This Metasploit module connects to a specified Metasploit RPC server and uses the ‘console.write’ procedure to execute operating system commands. Valid credentials are required to access the RPC interface. This Metasploit module has been tested successfully on Metasploit 4.15 on Kali 1.0.6; Metasploit 4.14 on Kali 2017.1; and Metasploit 4.14 on Windows 7 SP1. Source: […]

The post Metasploit RPC Console Command Execution appeared first on MondoUnix.

 

 

0

Hacking Lab con ProxMox e Metasploitable

Il FabLab Bassa Romagna e ImoLUG hanno intrapreso un percorso di approfondimento su ProxMox, un progretto OpenSource basato sul sistema operativo Debian Linux per la virtualizzazione di sistemi operativi, incontrandosi ogni martedì per affrontare tematiche diverse. Martedì 23 Maggio sarò ospite al FabLab Bassa Romagna per insegnare come è possibile creare un proprio Hacking Lab. Creare un laboratorio nella […]

 

0

Hacking Lab: Virtualize Metasploitable on ProxMox

Proxmox is open source server virtualization management software. It is a Debian-based Linux distribution  and very perfect to create your Hacking Lab on your local networking. The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. Never expose this VM to an untrusted network […]

 

0

PHPMailer Sendmail Argument Injection

## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##   require 'msf/core'   class MetasploitModule < Msf::Exploit::Remote Rank = ManualRanking   include Msf::Exploit::FileDropper include Msf::Exploit::Remote::HttpClient   def initialize(info = {}) super(update_info(info, 'Name' => 'PHPMailer Sendmail Argument Injection', 'Description' => %q{ PHPMailer versions up to and including 5.2.19 are affected by a vulnerability [...]

 

 

 

 

0

WordPress Ajax Load More PHP Upload

## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##   require 'msf/core'   class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking   include Msf::Exploit::Remote::HTTP::Wordpress include Msf::Exploit::FileDropper   def initialize(info = {}) super(update_info(info, 'Name' => 'Wordpress Ajax Load More PHP Upload Vulnerability', 'Description' => %q{ This module exploits an arbitrary file upload in the [...]