Files
metasploit-gs/documentation/modules/post/windows/gather/enum_hostfile.md
T
2020-10-19 05:19:27 -04:00

46 lines
1.2 KiB
Markdown

## Vulnerable Application
This module reads the hosts file on Windows systems, located at:
`C:\\Windows\\System32\\drivers\\etc\\hosts`. Any content lines are printed
and the file is stored in loot.
## Verification Steps
1. Start msfconsole
1. Get a session on Windows
1. Do: `use post/windows/gather/enum_hostfile`
1. Do: `set session [#]`
1. Do: `run`
1. You should get the hosts file
## Options
## Scenarios
### Windows 10
```
msf6 post(windows/gather/enum_hostfile) > use post/windows/gather/enum_hostfile
msf6 post(windows/gather/enum_hostfile) > sessions -i 5
[*] Starting interaction with 5...
meterpreter > sysinfo
Computer : MSEDGEWIN10
OS : Windows 10 (10.0 Build 16299).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x86/windows
meterpreter > background
[*] Backgrounding session 5...
msf6 post(windows/gather/enum_hostfile) > set session 5
session => 5
msf6 post(windows/gather/enum_hostfile) > run
Found entries:
[+] 1.1.1.1 supersecret
[*] Hosts file saved: /root/.msf4/loot/20201011174103_default_192.168.2.92_hosts.confige_103430.txt
[*] Post module execution completed
```