Showing posts with label Metasploit Module. Show all posts
Showing posts with label Metasploit Module. Show all posts

Wednesday, 1 April 2015

Reflective DLL Injection Metasploit Module



Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process. As such the library is responsible for loading itself by implementing a minimal Portable Executable (PE) file loader. It can then govern, with minimal interaction with the host system and process, how it will load and interact with the host.

Injection works from Windows NT4 up to and including Windows 8, running on x86, x64 and ARM where applicable.

Download  : Reflective DLL Injection Exploit

VIDEO TUTORIAL : 

Tuesday, 31 March 2015

Windows Manage Memory Payload Injection



This module will inject a payload into memory of a process. If a payload isn't selected, then it'll default to a reverse x86 TCP meterpreter. If the PID datastore option isn't specified, then it'll inject into notepad.exe instead.

Exploit : exploit/windows/local/payload_inject

VIDEO :  
 

Sunday, 17 March 2013

Windows Gather USB Drive History Metasploit Module

msf

This module will enumerate USB Drive history on a target host.


Usage Information


msf > use post/windows/gather/usb_history
msf post(usb_history) > set SESSION [INTEGER]

Module Options



















SESSIONThe session to run this module on.
VERBOSEEnable detailed status messages
WORKSPACESpecify the workspace for this module