Writing a Metasploit post exploitation module
Tags
attack-pattern: | Data Ip Addresses - T1590.005 Software - T1592.002 |
Common Information
Type | Value |
---|---|
UUID | bdc29055-4528-4a67-b265-e017bfda3a40 |
Fingerprint | f6363a786ea5a14c |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | April 6, 2015, 1:56 p.m. |
Added to db | Jan. 18, 2023, 10:25 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Writing a Metasploit post exploitation module |
Title | Writing a Metasploit post exploitation module |
Detected Hints/Tags/Attributes | 36/1/29 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 15 | sensepost.com |
|
Details | Domain | 3 | optstring.new |
|
Details | Domain | 105 | domain.com |
|
Details | Domain | 3 | optbool.new |
|
Details | Domain | 29 | metasploit.com |
|
Details | Domain | 4128 | github.com |
|
Details | Domain | 2 | securitycafe.ro |
|
Details | 2 | etienne@sensepost.com |
||
Details | 1 | author@domain.com |
||
Details | File | 1 | enum_domain_users.rb |
|
Details | File | 312 | calc.exe |
|
Details | File | 1 | common.rb |
|
Details | File | 1 | file.rb |
|
Details | File | 1 | windows.rb |
|
Details | File | 1 | registry.rb |
|
Details | File | 1 | runas.rb |
|
Details | File | 1 | services.rb |
|
Details | File | 1 | c:\\wamp\\www\\config.php |
|
Details | File | 2 | session.sys |
|
Details | File | 64 | config.sys |
|
Details | File | 119 | smss.exe |
|
Details | File | 165 | csrss.exe |
|
Details | File | 89 | wininit.exe |
|
Details | File | 306 | services.exe |
|
Details | Github username | 46 | rapid7 |
|
Details | IPv4 | 28 | 4.0.0.0 |
|
Details | Url | 2 | http://metasploit.com/download |
|
Details | Url | 5 | https://github.com/rapid7/metasploit-framework |
|
Details | Windows Registry Key | 2 | HKLM\SYSTEM\ControlSet001\Services |