Friday
Jan302009
More Meterpreter Post Exploitation Fun
Friday, January 30, 2009 at 9:26PM
Well guys 2 more of my scripts passed mustered and where committed to the Metasploit SVN, this scripts are:
- gettelnet- This script will enable telnet service on the target machine if it is running Windows 2003 or higher, in the case of Windows Vista and Windows 2008 that do not have the service installed by default the script will install the service and configure it to start automatically, in addition a username and password can be provided so that a local account with administrative privelages can be created and placed in the apropiate groups.
- remotewinenun - This script will run wmic command enumerating diferent settings from a target computer using the credential of the process under withc meterpreter is running under, a username and password can also be provided.
tagged Metasploit, meterpreter, ruby, script
Reader Comments (2)
Very good work! A nice option for the gettelnet script would be to launch the telnet server on a port different from the default one. (IIRC Windows restricts it to <1024)
Had a case on Windows Server 2003 for Small Business Server where gettelnet didn't work, the telnet wasn't installed by default, so it was necessary to issue first tlntsvr /service to install it manually and then run the script again.