8331f4d2ad
Also tweaks an error message add readme to directory
63 lines
2.9 KiB
Markdown
63 lines
2.9 KiB
Markdown
## Sessions Command
|
|
|
|
### Session Search
|
|
|
|
When you have a number of sessions open, searching can be a useful tool to navigate them. This guide explains what capabilities are available for navigating open sessions with search.
|
|
|
|
You can get a list of sessions matching a specific criteria within msfconsole:
|
|
|
|
```msf
|
|
msf6 payload(windows/meterpreter/reverse_http) > sessions --search "session_id:1 session_id:2"
|
|
Active sessions
|
|
===============
|
|
|
|
Id Name Type Information Connection
|
|
-- ---- ---- ----------- ----------
|
|
1 meterpreter x86/windows WIN-ED9KFH65RDH\Zach Goldman @WIN-ED9KFH65RDH 192.168.2.1:4444 -> 192.168.2.132:52190 (192.168.2.132)
|
|
|
|
```
|
|
|
|
Currently, the only supported keywords for search are `session_id`, `session_type`, and `last_checkin`. These keywords can be combined to further filter your results, and used with other flags. For example:
|
|
|
|
```msf
|
|
msf6 payload(windows/meterpreter/reverse_http) > sessions --search "session_id:1 session_type:meterpreter last_checkin:greater_than:10s last_checkin:less_than:10d5h2m30s" -v
|
|
|
|
Active sessions
|
|
===============
|
|
|
|
Session ID: 1
|
|
Name:
|
|
Type: meterpreter windows
|
|
Info: WIN-ED9KFH65RDH\Zach Goldman @ WIN-ED9KFH65RDH
|
|
Tunnel: 192.168.2.1:4444 -> 192.168.2.132:52190 (192.168.2.132)
|
|
Via: exploit/multi/handler
|
|
Encrypted: Yes (AES-256-CBC)
|
|
UUID: 958f7b976db67d60/x86=1/windows=1/2023-10-19T12:38:05Z
|
|
CheckIn: 21725s ago @ 2023-10-19 09:26:08 -0500
|
|
Registered: No
|
|
|
|
```
|
|
|
|
Of note in the above example, `last_checkin` requires an extra argument. The second argument must be either `greater_than` or `less_than`. The third argument can be a sequence of alternating amounts and units of time (d: days, h: hours, m: minutes, and s: seconds), i.e. `5m2s`, `10d`, or `1d5m`.
|
|
|
|
### Killing stale sessions
|
|
|
|
If `--search` is used in conjunction with `--kill-all`, it will restrict the latter function to only the search results. For example:
|
|
|
|
```msf
|
|
msf6 payload(windows/meterpreter/reverse_http) > sessions -K -S "session_type:meterpreter"
|
|
[*] Killing matching sessions...
|
|
|
|
Active sessions
|
|
===============
|
|
|
|
Id Name Type Information Connection
|
|
-- ---- ---- ----------- ----------
|
|
1 meterpreter x86/windows WIN-ED9KFH65RDH\Zach Goldman @ WIN-ED9KFH65RDH 192.168.2.1:4444 -> 192.168.2.132:52190 (192.168.2.132)
|
|
2 meterpreter x86/windows WIN-ED9KFH65RDH\Zach Goldman @ WIN-ED9KFH65RDH 192.168.2.1:4444 -> 192.168.2.132:52192 (192.168.2.132)
|
|
|
|
[*] 192.168.2.132 - Meterpreter session 1 closed.
|
|
[*] 192.168.2.132 - Meterpreter session 2 closed.
|
|
msf6 payload(windows/meterpreter/reverse_http) >
|
|
```
|