Metasploit mailing list archives

News from Metasploit 4. (Richard Miles) reverse https over auth proxy


From: anthony <kcrond () gmail com>
Date: Tue, 13 Sep 2011 22:47:29 +0800

Hi Patrick,

May I ask what authenticated proxy is it?
NTLM or....?
Username and password is store in IE?


On Sun, Aug 28, 2011 at 1:00 AM,
<framework-request () spool metasploit com> wrote:
Send framework mailing list submissions to
       framework () spool metasploit com

To subscribe or unsubscribe via the World Wide Web, visit
       https://mail.metasploit.com/mailman/listinfo/framework
or, via email, send a message with subject or body 'help' to
       framework-request () spool metasploit com

You can reach the person managing the list at
       framework-owner () spool metasploit com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of framework digest..."


Today's Topics:

  1. Re: MSSQL enum module (Nicolas Braud-Santoni)
  2. Re: News from Metasploit 4. (Richard Miles)
  3. Re: News from Metasploit 4. (Richard Miles)


----------------------------------------------------------------------

Message: 1
Date: Fri, 26 Aug 2011 19:13:17 +0200
From: Nicolas Braud-Santoni <nicolas.braudsantoni () gmail com>
To: framework () spool metasploit com
Subject: Re: [framework] MSSQL enum module
Message-ID: <20110826191317.59c77019 () gmail com>
Content-Type: text/plain; charset=UTF-8

John,

If you are concerned about Metasploit corrupting/modifying the DB, you
can create an user who doesn't have INSERT/DROP/... privileges.


Hoping that helps

Nicolas


PS : It could be nice of you to write your questions in correct
English, since it would make it easier for us non-native speakers.

Le Fri, 26 Aug 2011 11:04:57 -0500,
Tod Beardsley <todb () planb-security net> a ?crit :

Almost all of the commands in mssql_enum are simple select statements,
with the one exception of the:

"sp_config 'show advanced option', '1'; reconfigure"

statement, which is a common and unobtrusive command to list config
options.

So, looks good to me. I would be fine running this in production.

On Fri, Aug 26, 2011 at 3:03 AM, John Mistikopoulos
<mailtest1223133456 () gmail com> wrote:
Helllo.
The module mssql_enum is intrusive, I mean its execution can harm
the database?
Thnx,
John

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework



------------------------------

Message: 2
Date: Fri, 26 Aug 2011 15:10:01 -0500
From: Richard Miles <richard.k.miles () googlemail com>
To: egypt () metasploit com
Cc: framework () spool metasploit com
Subject: Re: [framework] News from Metasploit 4.
Message-ID:
       <CAFMma9NggPCNLaXynuW=b-vu6q=O_HC_hwoJEHpRLrebbSGadg () mail gmail com>
Content-Type: text/plain; charset=UTF-8

Hi Egypt,

It's awesome, thanks for information. Also, do you have a working
version for 64 bits?

Any follow-up on the other 2 questions on the e-mail?

Thanks

On Fri, Aug 26, 2011 at 9:20 AM,  <egypt () metasploit com> wrote:
Yes, reverse_http(s) both use the WinInet API, and as such, use IE's
proxy configuration, including credentials.

egypt

On Fri, Aug 26, 2011 at 2:28 AM, Richard Miles
<richard.k.miles () googlemail com> wrote:
Hey Patrick,

Awesome, with the new reverse_http or reverse_https? Metasploit 4?

Thanks

On Thu, Aug 25, 2011 at 7:37 PM, Patrick Webster <patrick () aushack com> wrote:
Hey Richard,

I cannot guarantee 100%, but re: point #1, I have successfully used
the stager to get around proxies with auth about 2 months ago.

-Patrick

On Fri, Aug 26, 2011 at 8:42 AM, Richard Miles
<richard.k.miles () googlemail com> wrote:
Hi

I friend of mine was talking about some great improvements at
Metasploit 4, I checked the blog and it talks very briefly about it,
what more called my attention is that reverse_http and reverse_https
was updated and meterpreter scripts / resources too.

I have 3 questions...

1 - The new reverse_http and reverse_https now are as good as passiveX
was? I mean, we can use it completely over http or https (even the
stager) and the payload is smart enough to get proxy IP and port from
browser and re-use the same credential (in case that proxy require
auth)?

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework





------------------------------

Message: 3
Date: Fri, 26 Aug 2011 15:16:22 -0500
From: Richard Miles <richard.k.miles () googlemail com>
To: HD Moore <hdm () metasploit com>
Cc: framework () spool metasploit com
Subject: Re: [framework] News from Metasploit 4.
Message-ID:
       <CAFMma9OVxqDykeNCYoTy=xR6jgg8QNqpcCri+E1wv2k3niJb2Q () mail gmail com>
Content-Type: text/plain; charset=UTF-8

Hi HD Moore,

Thanks for links. Does the new reverse_http works in 64 bit Windows?
How should I call it?

Any follow-up on the other 2 questions on the e-mail?

Thanks

On Fri, Aug 26, 2011 at 9:19 AM, HD Moore <hdm () metasploit com> wrote:
The Metasploit blog includes quite a bit of information on 4.0:
?https://community.rapid7.com/community/metasploit?view=blog

You can also see the release notes:
?https://community.rapid7.com/docs/DOC-1496
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework



------------------------------

_______________________________________________
framework mailing list
framework () spool metasploit com
https://mail.metasploit.com/mailman/listinfo/framework


End of framework Digest, Vol 43, Issue 21
*****************************************

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: