Thoughts on Security
Posts Tagged meterpreter
More Spiders, Fewer Trees: Meterpreter Hop
Posted by scriptjunkie in Metasploit, Uncategorized on July 30, 2014
Just about every time you see a serious network intrusion where the attackers obtain access to internal networks, the attackers used “hop points” to conceal their identity and evade detection. … Setting up and using hop points has been a chore for penetration testers as well. Normally setting up a hop requires owning the server to open and listen on arbitrary ports and forward data. But today, using a new payload and session type I contributed to the metasploit framework, you can use any common PHP host as a hop for meterpreter. This is a big deal since it’s the first time metasploit has natively supported receiving a connect-back shell that goes somewhere other than directly to the Metasploit controller. … Check it out in the video below:
Writing Meterpreter Extensions
Posted by scriptjunkie in Metasploit on August 27, 2011
Railgun and other meterpreter functionality is awesome and can do almost everything you would like on a compromised system, but sometimes, due to performance or bandwidth requirements or just weird threading issues, you need to be able to run compiled code on a target. You can upload an executable to a system and run that, […]
Featured Posts
- Exploiting Ammyy Admin – developing an 0day
- Red Teaming the CCDC
- Installing Linux on a Live Windows System
- Adding Easy SSL Client Authentication To Any Webapp
- Remote Desktop and Die – How to RDP Faster Without Getting Robbed
- Fixing Pass The Hash and 14 Other Problems
- Saving shells with PrependMigrate
- Authenticated Remote Code Execution Methods in Windows
- Running Code From A Non-Elevated Account At Any Time
- Ambush – A New Capability for Advanced Defense
- Malicious VM to Host Attacks
- Direct shellcode execution in MS Office macros
- Original Source Forgery
- Writing Meterpreter Extensions
- Network Nightmare – PXE talk at Defcon
- Bypassing DEP/ASLR in browser exploits with McAfee and Symantec
- Firefox Exploit Analyzed
- Why Encoding Does not Matter and How Metasploit Generates EXE’s
- Shells, terminals, and sudo mitm
- Breaking mobile device crypto with chaos theory and hardware RNG’s
- Black Hat DC Presentation
- Command stagers in Windows
Categories
- /dev/urandom (21)
- CCDC (1)
- Crypto (3)
- Defense (19)
- Exploits (17)
- Legal thoughts (1)
- Metasploit (26)
- Uncategorized (32)
- Vulnerabilities (3)
- webapps (7)
Archives
- November 2021
- September 2021
- February 2021
- April 2020
- February 2020
- January 2020
- December 2019
- May 2019
- July 2018
- March 2018
- August 2017
- July 2017
- April 2017
- March 2017
- January 2017
- October 2016
- September 2016
- August 2016
- June 2016
- March 2016
- January 2016
- November 2015
- October 2015
- September 2015
- July 2015
- May 2015
- January 2015
- October 2014
- September 2014
- July 2014
- May 2014
- March 2014
- February 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- May 2012
- April 2012
- January 2012
- December 2011
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- October 2010
- September 2010
- August 2010
- July 2010
- May 2010
- April 2010
- March 2010