myAuxiliaryMeterpreter
myAuxiliaryMeterpreter Description
This auxiliary module needs [metasploit] framework installed..
This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script,
so we need to exploit a target first in order to use it.
Affected platforms:
Windows OS
(all versions above windows vista)
Read my WIKI for further info:
https://sourceforge.net/p/myauxiliarymete/wiki/Home/myAuxiliaryMeterpreter Features
SESSION => the session to run the module onCLEAR => clean IDS event logfiles on target hostGETPRIVS => elevate meterpreter to AUTHORITY/SYSTEM APPL => enumerate intalled applicationsLOGIN => enumerate Recently logged on usersHOST => dump hostfile of taget machine to loot folderHOSTFILE => add entrys to target hostfile <ip-add> <domain>DELHOST => revert target hostfile to default settingsMSG => display message in target desktopEXECUTE => execute an arbitary cmd command on target hostLABEL => rename the c: harddrive display nameUACSET => check if UAC is enabled and is level runningUACBYPASS => bypass UAC setting using regeditSETCH => backdoor setch.exe on target systemextra module includes:root3.rb => ruby script to execute a list of cmd commands on target host Download:
Click Here
No comments:
Post a Comment