Metasploit Modülleri
Hedef Sistemlerdeki Belgeleri Çekme Modülü
post/windows/gather/int_doc_find
Kaynak site:
http://pentestn00b.wordpress.com/2012/06/19/metasploit-post-module-interesting-documents-finder/
Bypass UAC (User Account Control) with Metasploit
post/windows/escalate/bypassuac
Kaynak site:
http://www.youtube.com/watch?feature=player_embedded&v=JzBw_949Qac#!
http://pauldotcom.com/2012/02/dumping-cleartext-credentials.html
Otomatik olarak çoklu modül ile çalışmak
post_auto.rb
Kaynak site:
https://github.com/darkoperator/Metasploit-Plugins/blob/master/post_auto.rb
Setting SYSTEM's proxy settings with Metasploit
enum_proxy
clone_proxy_settings
Kaynak site:
http://www.room362.com/blog/2012/10/21/setting-systems-proxy-settings-with-metasploit.html
Hedef Sistemin Komut Satırına Bağlanma
exploit/windows/smb/psexec
Kaynak site:
http://www.offensive-security.com/metasploit-unleashed/PSExec_Pass_The_Hash
Hedef Sistemde Son Kullanan Dokümanları Listeleme
post/windows/gather/dumplinks
Kaynak site:
http://www.offensive-security.com/metasploit-unleashed/Windows_Post_Gather_Modules#dumplinks
Hiç yorum yok:
Yorum Gönder