Metasploit mailing list archives
Metasploit on Windows
From: rekcahpmip at gmail.com (Jon D)
Date: Wed, 2 Jan 2008 10:08:15 -0500
Awesome. Thanks! On Jan 2, 2008 9:49 AM, Rhys Kidd <rhyskidd at gmail.com> wrote:
On 02/01/2008, Jon D <rekcahpmip at gmail.com> wrote:This may not be the place to do requests, but seeing the new version come out has made me remember something I've always wanted and never bothered to mention....For example, if you gain access to a computer and have a shell on it, you then want to pivot from that position. The trick is how. With the current metasploit, you have to install it, and either run a gui or run it in it's own custom shell. But if you only have command line access to the compromised box, you cannot install metasploit onto it, and even if you could, you couldn't run it from the command line. Anyway, just a thought. I think it would be useful.Jon D, Take a look at the Meterpreter payload in Metasploit. It's a DLL to remotely inject into the vulnerable process as a payload, allowing port forwarding and all manner of reconnaissance and pivoting (a la CORE IMPACT or Immunity CANVAS). Meterpreter is currently Windows only, although that appears to be your target OS. http://www.google.com/search?hl=en&q=Meterpreter&btnG=Google+Search&meta= Rhys
Current thread:
- Metasploit on Windows H D Moore (Jan 01)
- <Possible follow-ups>
- Metasploit on Windows Hamid . K (Jan 01)
- Metasploit on Windows Jon D (Jan 02)
- Metasploit on Windows H D Moore (Jan 02)
- Metasploit on Windows Rhys Kidd (Jan 02)
- Metasploit on Windows Jon D (Jan 02)