Writing a Metasploit post exploitation module
Common Information
Type Value
UUID bdc29055-4528-4a67-b265-e017bfda3a40
Fingerprint f6363a786ea5a14c
Analysis status DONE
Considered CTI value 0
Text language
Published April 6, 2015, 1:56 p.m.
Added to db Jan. 18, 2023, 10:25 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Writing a Metasploit post exploitation module
Title Writing a Metasploit post exploitation module
Detected Hints/Tags/Attributes 36/1/29
Attributes
Details Type #Events CTI Value
Details Domain 15
sensepost.com
Details Domain 3
optstring.new
Details Domain 105
domain.com
Details Domain 3
optbool.new
Details Domain 29
metasploit.com
Details Domain 4128
github.com
Details Domain 2
securitycafe.ro
Details Email 2
etienne@sensepost.com
Details Email 1
author@domain.com
Details File 1
enum_domain_users.rb
Details File 312
calc.exe
Details File 1
common.rb
Details File 1
file.rb
Details File 1
windows.rb
Details File 1
registry.rb
Details File 1
runas.rb
Details File 1
services.rb
Details File 1
c:\\wamp\\www\\config.php
Details File 2
session.sys
Details File 64
config.sys
Details File 119
smss.exe
Details File 165
csrss.exe
Details File 89
wininit.exe
Details File 306
services.exe
Details Github username 46
rapid7
Details IPv4 28
4.0.0.0
Details Url 2
http://metasploit.com/download
Details Url 5
https://github.com/rapid7/metasploit-framework
Details Windows Registry Key 2
HKLM\SYSTEM\ControlSet001\Services