Jump to content

Recommended Posts

Posted

We all know metasploit is easy to exploit a target machine as he/she just need to open a URL and BOOM!

My question is, In that temporary situation when we are exploiting a victim's machine on that specific time where metasploit store all it's exploit system.

Example;

we used autopwn and started hander now where metasploit store this temporary files?

Posted (edited)

Would you please give me a explanation rather than a posting public link.

See If you remember when we use SET then SET itself store those all exploit temporary files in (set/src/program_junk/ here are all Files)

Same thing i am asking for metsploit that when we exploiting on that time where metasploit store exploit temporary files?

If my question is incorrect or you think it's just a crap question then please i would like to grow up my knowledge so kindly explain me how it works?

Edited by L3arn3r
Posted

If you reference the link, it is the best how-to type manual for Metasploit. I can only assume you are asking for the location of the files while using metasploit payloads. My guess is they are in /tmp. But whatever it is you want those files for, I'm sure it's explained how to make your own with that link.

You can also try asking in irc.freenode.org #metasploit

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...