Showing posts with label Metasploit Auxiliary. Show all posts
Showing posts with label Metasploit Auxiliary. Show all posts

Wednesday, 1 April 2015

Reflective DLL Injection Metasploit Module



Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process. As such the library is responsible for loading itself by implementing a minimal Portable Executable (PE) file loader. It can then govern, with minimal interaction with the host system and process, how it will load and interact with the host.

Injection works from Windows NT4 up to and including Windows 8, running on x86, x64 and ARM where applicable.

Download  : Reflective DLL Injection Exploit

VIDEO TUTORIAL : 

Tuesday, 31 March 2015

Windows Manage Memory Payload Injection



This module will inject a payload into memory of a process. If a payload isn't selected, then it'll default to a reverse x86 TCP meterpreter. If the PID datastore option isn't specified, then it'll inject into notepad.exe instead.

Exploit : exploit/windows/local/payload_inject

VIDEO :  
 

Friday, 22 March 2013

HTTP SSL Certificate Information using Metasploit Auxiliary module

msf

Parse the server SSL certificate to obtain the common name and signature algorithm

Rank


- Normal

Authors



  • et < et [at] metasploit.com >

  • Chris John Riley < >

  • Veit Hailperin < hailperv [at] gmail.com >


msf > use auxiliary/scanner/http/ssl
msf auxiliary(ssl) > set RHOSTS [TARGET HOST RANGE]
msf auxiliary(ssl) > run

Source Code : http://adf.ly/LL7LN

 VIDEO :