Search the Community
Showing results for tags 'msf'.
-
hello, I'm looking for a way, with or without metasploit to be able to simply restart a livebox because it no longer distributes internet (I have no opportunity to touch it physically).
-
I'm currently trying to gain access to a practice server, according to Nessus it has 1x Critical vuln and 2x Medium vulns, they are: Critical: CVE-2004-1154 Samba smbd Security Descriptor Parsing Remote Overflow. Medium: CVE-2016-2118 Samba Badlock Vulnerability. Medium: SMB Signing Disabled. I've searched Google, ExploitDB and msf for exploits for the Critical vuln but I keep coming up blank. Nessus explains that crafting packets with hundreds of thousands of ACLs would cause a remote buffer overrun, but how do I take advantage of that? Or, am I focussing too much on the critical vuln when I could take advantage of the medium vulns easier? Help and pointers appreciated! Mike
-
guys, I ve made a payload with SET that isnt detectable by windows defender, I can perfectly get a meterpreter session without beign detected, anyway i can do most of the actions that are possible in meterpterer , but when I run the persistence command , Windows Defender gives a report of a trojan Swrort.A . some info Victim pc is running windows 10 64-bit I am attacking localy the attacker is kali sana 2.0 So the question is how can I avoid detection?
- 1 reply
-
- msf
- metasploit
-
(and 3 more)
Tagged with:
-
Hey guys, I have a JAVA project and I want to add this msfvenom payload to it, but I have no idea how to "execute" this buf. Anyone know how to do this? or is there any other option on injecting code ? --the payload was generated with './msfvenom -p osx/x64/say TEXT="it works" -f java' thanks. buf = new byte[] { (byte) 0x48, (byte) 0x31, (byte) 0xc0, (byte) 0xb8, (byte) 0x3b, (byte) 0x00, (byte) 0x00, (byte) 0x02, (byte) 0xe8, (byte) 0x16, (byte) 0x00, (byte) 0x00, (byte) 0x00, (byte) 0x2f, (byte) 0x75, (byte) 0x73, (byte) 0x72, (byte) 0x2f, (byte) 0x62, (byte) 0x69, (byte) 0x6e, (byte) 0x2f, (byte) 0x73, (byte) 0x61, (byte) 0x79, (byte) 0x00, (byte) 0x69, (byte) 0x74, (byte) 0x20, (byte) 0x77, (byte) 0x6f, (byte) 0x72, (byte) 0x6b, (byte) 0x73, (byte) 0x00, (byte) 0x48, (byte) 0x8b, (byte) 0x3c, (byte) 0x24, (byte) 0x4c, (byte) 0x8d, (byte) 0x57, (byte) 0x0d, (byte) 0x48, (byte) 0x31, (byte) 0xd2, (byte) 0x52, (byte) 0x41, (byte) 0x52, (byte) 0x57, (byte) 0x48, (byte) 0x89, (byte) 0xe6, (byte) 0x0f, (byte) 0x05 };
- 4 replies
-
- help
- metaspolit
-
(and 2 more)
Tagged with:
-
I would like to know if there is a way to generate random exe templates for injecting custom shellcode into; just like msf pro does. Is there a manual way to do this? If not, where can I find the information I will need to write my own? I am not a programmer so this will need to be VERY good instruction for me to be able to follow. I am willing to learn but I am very inexperienced here. I basically need to be able to create my own custom/random exe template then know how to add the custom shellcode into it that is created by msfvenom's output so that it runs. Thanks to all who help!
- 2 replies
-
- msf
- metasploit
- (and 5 more)