Quantcast
Channel: Pax Pentest » Meterpreter
Browsing latest articles
Browse All 19 View Live

Metasploit Meterpreter: Killing Antivirus Software on Exploited System – Killav

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article



Metasploit: Listing Meterpreter Post Exploitation Modules

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter Railgun: Post Exploit Windows API Manipulation

Metasploit: The Penetration Tester’s Guide has this to say about Railgun: You can interface with the Windows native API directly through a Metasploit add-on called Railgun. [....] Railgun gives you the...

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Internet Explorer “Aurora” Memory Corruption...

I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...

View Article

Metasploit Meterpreter: MS11-006 Client-Side Malicious Document Exploit –...

I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...

View Article


Image may be NSFW.
Clik here to view.

Metasploit: My First Successful Armitage Exploit

I just completed my first successful exploit in the marvellous Metasploit GUI Armitage. Details of the target machine on my Virtual Hacking Lab: Windows XP Pro Service Pack 2 (unpatched). Firewall and...

View Article

Image may be NSFW.
Clik here to view.

Seting up a simple backdoor shell using Ncat via Metasploit Armitage

First I exploited my Windows system with Metasploit Armitage obtaining a Meterpreter shell as per this post. Then I needed to upload the ncat.exe file (which I download from here) to the target...

View Article

Image may be NSFW.
Clik here to view.

Creating a persistent Ncap backdoor in Windows XP startup using Metasploit

I couldn’t figure out how to do this in Armitage and so had to resort to the good ol’ Terminal. I exploited the XP system as per this post and obtained an Meterpreter shell. First to upload the...

View Article


Metasploitable 2: Java RMI (Remote Method Invocation) Server

The Nmap scan of Metasploitable 2 revealed: PORT      STATE SERVICE     VERSION 1099/tcp  open  rmiregistry GNU Classpath grmiregistry From Wiki: The Java Remote Method Invocation (Java RMI) is a Java...

View Article


Metasploitable 2: Port 5432 – PostgreSQL

The Nmap scan of Metasploitable 2 revealed: PORT      STATE SERVICE     VERSION 5432/tcp  open  postgresql  PostgreSQL DB 8.3.0 – 8.3.7 This exploit is straight forward brute force using Metasploit:...

View Article
Browsing latest articles
Browse All 19 View Live




Latest Images