Skip to main content

All Questions

Tagged with
0votes
1answer
210views

How to embed a PE file to another PE files

So what I want to do basically is what BDFproxy does on the go, I want to modify a file (on the disk) to embed another PE in it and have both working, it does not matter if they work concurrently or ...
LuckyCoder3607's user avatar
0votes
0answers
281views

Is it possible to disable screenshare if someone's got meterpreter shell on your PC?

If hypothetically there was a meterpreter shell installed on your pc, are there security features or ways to harden a Windows laptop to prevent the hacker from using the screen share command to spy on ...
Rachel's user avatar
0votes
1answer
277views

What is the version of the scanned OS?

I've scanned a target with metasploit scanner/smb/smb_version and nmap -O. smb_version: Windows 2016 Standard (build:14393) Nmap: Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows What is ...
quality38's user avatar
2votes
0answers
1kviews

Windows XP SP3 2002 is not vulnerable to MS08-067

Why is my VM not vulnerable to MS08-067? There are similar question on stack exchange, yes, but they fail to specify all relevant information and so non receive a meaningful, thoughtful nor thorough ...
HackingAndJiuJItsu's user avatar
1vote
1answer
1kviews

Error with Metasploit when attempting to exploit netapi in Windows XP [duplicate]

I am a beginner in hacking. I have been trying to hack Windows XP using the netapi exploit in metasploit, but every time, in the end, I get an error: Exploit failed [unreachable]: Rex::...
Aakash Sharma's user avatar
0votes
1answer
5kviews

RubySMB::Error::CommunicationError: Read timeout expired when reading from the Socket (timeout=30)

I've been playing around with the EternalBlue exploit recently. I've downloaded a Windows 10 iso file from 2016 and used it to set up a Windows 10 Pro VM as my sandbox. I also ran the nmap script and ...
CBCH's user avatar
1vote
0answers
1kviews

msfvenom: how to output assembly of windows payload for inline assembly in C?

My goal is to obfuscate metasploit windows payloads' assembly code (adding junk code to the payload itself), then adding the obfuscated shellcode to inline assembly in C. The issue is there is no ...
pokkery98's user avatar
0votes
0answers
393views

How does meterpreter STDAPI bypass window's webcam restriction's settings

How does the stdapi commands 'webcam_snap' and 'webcam_stream' in meterpreter session bypass webcam restrictions/privacy settings on windows? I want to know how one could replicate this for prevention ...
sd dev 's user avatar
4votes
1answer
27kviews

How to connect to a meterpreter session opened manually on the target machine

I am trying to exploit a Windows 7 VM using metasploit. I was able to open a java meterpreter session and I want to access a native meterpreter. To do so I exported a meterpreter/reverse_tcp payload ...
Ignatius_Gim's user avatar
0votes
0answers
373views

ms08_067_netapi exploit & pivoting problem

I'm having troubles with ms08_067_netapi. I have a private network with a web server (10.10.2.10), windows 7 (10.10.2.8) and windows XP (10.10.2.9). I'm hacking from outside the private network with ...
Victor's user avatar
1vote
1answer
5kviews

Windows 64-bit Reverse TCP Shell not working

I am sending shellcode to a 64-bit binary running on a Windows machine. This binary, copies the shellcode to an executable region of memory and executes it. I am generating the shellcode using ...
Neon Flash's user avatar
0votes
0answers
749views

Pen testing, Windows: Using credentials to impersonate users from SYSTEM

Following simple scenario during pen test: I have remote code execution on a windows box and am SYSTEM (either because of the way I got onto the box or because of the persistence method I chose) I ...
manduca's user avatar
  • 1,121
3votes
1answer
1kviews

Metasploit: pivoting to machine without internet access

Let's imagine the following (not uncommon) scenario: I'm doing a pentest from the outside I have a meterpreter session from a company PC that´s within their infrastructure (Let´s say w/ reverse HTTPS) ...
manduca's user avatar
  • 1,121
0votes
1answer
2kviews

Norton blocks my Metasploit attacks, is there a way to bypass?

im pretty new to pentesting and im just about learning using metasploit. So i setted up my old pc at home ( Windows 7 Professional, x64 architecture ), connected it to my lan and started trying to ...
genaray's user avatar
1vote
0answers
2kviews

Unable to migrate meterpreter into 64 bit process? [duplicate]

How to migrate a meterpreter process into a 64 bit process? When i run following exploit (ie_execcommand_uaf), it migrates into explorer which is 32 bit rather than to notepad.exe which is a 64 bit ...
user168454's user avatar

153050per page
close