Metasploit mailing list archives
Metasploit on Windows
From: rhyskidd at gmail.com (Rhys Kidd)
Date: Wed, 2 Jan 2008 23:49:56 +0900
On 02/01/2008, Jon D <rekcahpmip at gmail.com> wrote:
This may not be the place to do requests, but seeing the new version come out has made me remember something I've always wanted and never bothered to mention.
... For example, if you gain access to a computer and have a shell on it,
you then want to pivot from that position. The trick is how. With the current metasploit, you have to install it, and either run a gui or run it in it's own custom shell. But if you only have command line access to the compromised box, you cannot install metasploit onto it, and even if you could, you couldn't run it from the command line. Anyway, just a thought. I think it would be useful.
Jon D, Take a look at the Meterpreter payload in Metasploit. It's a DLL to remotely inject into the vulnerable process as a payload, allowing port forwarding and all manner of reconnaissance and pivoting (a la CORE IMPACT or Immunity CANVAS). Meterpreter is currently Windows only, although that appears to be your target OS. http://www.google.com/search?hl=en&q=Meterpreter&btnG=Google+Search&meta= Rhys -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20080102/3d798b10/attachment.htm>
Current thread:
- Metasploit on Windows H D Moore (Jan 01)
- <Possible follow-ups>
- Metasploit on Windows Hamid . K (Jan 01)
- Metasploit on Windows Jon D (Jan 02)
- Metasploit on Windows H D Moore (Jan 02)
- Metasploit on Windows Rhys Kidd (Jan 02)
- Metasploit on Windows Jon D (Jan 02)