@obscuresec is also a contributor to the powersploit project, and not too long ago he had a really cool blog post detailing one way to execute a meterpreter payload within a powershell process. I thought this idea was really cool so I decided to try and take a stab at writing a metasploit module that implements a slightly modified version of this technique.
Many times in a penetration test I find myself having valid credentials to a target machine, but my payload keeps getting busted when I try and upgrade my shell to meterpreter.
This module allows you to use metasploit's existing powershell encoded payloads, or you can specify a file to use that contains a powershell script (such as powersploit) that will be executed on the target machine within the powershell process.At the very minimum, will need to set the LHOST, RHOST, ARCH, SMBUSER and SMBPASS variables.
Authenticated Metasploit Payloads |
Authenticated Metasploit Payloads via Powershell Psexec | Security Padawan
No comments:
Post a Comment