• SEO文章推广! 合作联系qq:122325244 正式全面改版 !免费SEO地址:https://www.seozhan.cn/tool 站长QQ群
  • 如果您觉得本站非常有看点,那么赶紧使用Ctrl+D 收藏SEO站长博客吧

Mad-Metasploit:一款众效用Metasploit自界说模块、插件资源剧本套件

脚本编程 SEO站长博客 2个月前 (08-01) 25次浏览 未收录 0个评论

摘要

Mad-Metasploit 是一款针对 Metasploit 的众性能框架,该框架供应了众种自界说模块、插件和资源剧本。

   若何将 Mad-Metasploit 增加到 Metasploit 框架?

1. 设备你的metasploitframework目次:

   $ vim config/config.rb $ metasploit_path= /opt/metasploit-framework/embedded/framework/ # /usr/share/metasploitframework

2-A、交互形式:

   $./madmetasploit

2-B、下令行形式:

   $./madmetasploit [-a/-y/–all/–yes] 行使自界说模块

摸索 auxiliary/exploits:

   HAHWUL> search springboot Matching Modules ================ NameDisclosure Date Rank CheckDescription —- ————— ——— ———– auxiliary/mad_metasploit/springboot_actuator normal NoSpringboot actuator check 行使自界插件

正在 msfconsole 中加载mad-metasploit/{plugins}:

   HAHWUL> load mad-metasploit/db_autopwn [*]Successfully loaded plugin: db_autopwn HAHWUL> db_autopwn [-]The db_autopwn command is DEPRECATED [-]Seehttp: [*]Usage: db_autopwn [options] -h Display this help text -t Show all matching exploit modules -x Select modules based on vulnerabilityreferences -p Select modules based on open ports -e Launch exploits against all matchedtargets -r Use a reverse connect shell -b Use a bind shell on a random port(default) -q Disable exploit module output -R[rank] Only run modules with aminimal rank -I[range] Only exploit hosts inside this range -X[range] Always exclude hosts inside this range -PI [range] Only exploit hosts with theseports open -PX [range] Always exclude hosts withthese ports open -m[regex] Only run modules whose name matches the regex -T[secs] Maximum runtime for anyexploit in seconds etc… 插件列外: mad-metasploit/db_autopwn mad-metasploit/arachni mad-metasploit/meta_ssh mad-metasploit/db_exploit 行使资源剧本 #>msfconsole MSF> load alias MSF> alias ahosts resource/mad-metasploit/resource-script/ahosts.rc MSF> ahosts [Custom command!] 资源列外: ahosts.rc cache_bomb.rb feed.rc getdomains.rb getsessions.rb ie_hashgrab.rb listdrives.rb loggedon.rb runon_netview.rb search_hash_creds.rc virusscan_bypass8_8.rb Archive 模块机合 archive/ └── exploits ├── aix │├── dos ││ ├── 16657.rb ││ └── 16929.rb │ ├──local ││ └── 16659.rb │└── remote │└── 16930.rb ├── android │├── local ││ ├── 40504.rb ││ ├── 40975.rb ││ └── 41675.rb │└── remote │├── 35282.rb │├── 39328.rb │├── 40436.rb │└── 43376.rb ….. 器械更新 mad-metasploit: $./mad-metasploit –u mad-metasploit-archive: $ruby auto_archive.rb

或者

   $./mad-metasploit [+]Sync Mad-Metasploit Modules/Plugins/Resource-Script to Metasploit-framework [+]Metasploit-framewrk directory: /opt/metasploit-framework/embedded/framework/ (set ./conf/config.rb) [*]Update archive(Those that are not added as msf)? [y/N] y [-]Download index data.. 若何移除 mad-metasploit? $./mad-metasploit -r $./mad-metasploit –remove 自界说开垦

克隆 mad-metasploit 项目代码至当地:

   $ git clone https://mad-metasploit

增加自界说代码:

   ./mad-metasploit-modules + exploit + auxiliray + etc.. ./mad-metasploit-plugins ./mad-metasploit-resource-script 项目地点

Mad-Metasploit:【官方网站】

Mad-Metasploit:【GitHub】


SEO站长博客 , 版权所有丨如未注明 , 均为原创丨本网站采用BY-NC-SA协议进行授权
转载请注明原文链接:Mad-Metasploit:一款众效用Metasploit自界说模块、插件资源剧本套件
喜欢 (0)
[h4ck3st@126.com]
分享 (0)
发表我的评论
取消评论
表情 贴图 加粗 删除线 居中 斜体 签到

Hi,您需要填写昵称和邮箱!

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址