Skip to main content

All Questions

Tagged with
1vote
1answer
119views

Metasploit search features returns intersection of results

When I use multiple search criteria in Metasploit it shows the results as an "or" rather than an "and". I see that this was asked several years ago so now I am wondering if this ...
osus71's user avatar
2votes
1answer
414views

Does Routersploit install any malware or executables on my PC?

If I install Routersploit on my PC, would it install any malware or executable binaries as part of it to PC? Even though developers of Routersploit do not have any nefarious intention to add malware, ...
Ajay's user avatar
2votes
1answer
654views

Msfvenom reverse_tcp without LHOST

I have tested SMBGhost (CVE-2020-0796). I used the following msfvenom command to generate a reverse shell payload. msfvenom - p windows/x64/meterpreter/reverse_tcp LPORT = 4444 - b '\x00' - i 1 - f ...
HelpMe's user avatar
0votes
1answer
1kviews

Exploit failed: NoMethodError undefined method `smtp_send_recv' for #<Module:exploit/unix/smtp/exim4_string_format [closed]

I was trying to run an exploit using Metasploit's Exim tool. In the process I will have used the exim4_string_format module. I gave as information a RHOST, LHOSTS AND LPORT. To attack the reverse_perl ...
larasputinnieiwqgbpre's user avatar
0votes
1answer
925views

Import a exploit into msfconsole on ubuntu

I'm attending a offensive security courses and one of the subject is import a exploit from exploitdb into msfconsole. Commonly advice that it's required to create a exploit folder inside .msf4 and ...
Gabriel Alejandro Rivas Mata's user avatar
0votes
0answers
649views

Metasploit module for NULL LDAP credentials

This article covers the solution for the LDAP challenges on a capture the flag. I understand how the first example works, using the NULL value for the username and password to authenticate to the LDAP ...
questioner's user avatar
0votes
0answers
25views

Can I import this exploit on metasploit or is better to use it in python? [duplicate]

I have tried to import this exploit: https://www.exploit-db.com/exploits/50539 and then use it in Metasploit (I'm following a walkthrough), but Metasploit cannot load it. Also I tried to use Python ...
Jorge Corante's user avatar
0votes
1answer
1kviews

How can I generate a binary from an payload without any other addons?

For example how do I turn the payload/windows/format_all_drives into an exe without any other fancy addons? (I am talking about using msfvenom FYI)
404's user avatar
0votes
1answer
3kviews

Metasploit doesn't find exploit added from exploit-db [closed]

I'm using Metasploit. I tried adding the file 46731.rb to both /usr/share/metasploit-framework/modules/exploits/confluence/46731.rb and ~/.msf4/modules/exploits/msf4/46731.rb. Then I updated the ...
user3207874's user avatar
1vote
0answers
550views

Exploiting WebDav [closed]

I'm trying to exploit webdav by uploading a msfvenom generated php script to the target webdav server on windows xp machine using the default credentials - wampp(username), xampp(password). The ...
Abhirup Bakshi's user avatar
0votes
1answer
439views

Are metasploit exploits port-specific (smb-samba)?

I was trying a machine on vulnhub and I found port 139 open that was samba-4.3.11. I searched for an exploit for that particular version and I found the is_known_pipename() exploit. But when I ran it, ...
Bhavik Malhotra's user avatar
0votes
2answers
239views

Is it safe to browse the internet with unpatched iPhone with iOS 13.1.3?

I am using unpatched iPhone that has IOS 13.1.3 installed. Apple released IOS 13.1.3 15 Oct 2019. Are there any vulnerabilities for IOS 13.1.3's safari that are currently being exploited in the wild? ...
Npxkytzv's user avatar
0votes
2answers
226views

Is exploit different from the kernel level or root?

I'm learning about privilege escalation. I'm trying exploits in my lab machine like vulnhub. In my opinion, if I successfully run the exploit linux/local/udev/net_link, I can read etc/shadow and etc/...
pfaclix's user avatar
2votes
1answer
1kviews

Nessus found a vulnerability, but no corresponding exploit on Metasploit : How to run with meterpreter

I ran Nessus on a local network, it found a critical vulnerability for the router: MikroTik RouterOS < 6.41.3 SMB Buffer Overflow (Vulnerability description : Exploit-db) But I can't find any ...
Johnny Pralo's user avatar
4votes
1answer
9kviews

Metasploit is not detecting newly imported python exploit

I have added OpenSSH 7.2p2 - Username Enumeration exploit to Metasploit, which is a python exploit. But after so, it does not detect that exploit every way I tried. I have placed it under the ...
Ratnadeep Chakraborty's user avatar

153050per page
close