Jump to content
Nytro

Windows Meterpreter-less Post Exploitation

Recommended Posts

Posted

Windows Meterpreter-less Post Exploitation

Authored by Sanoop Thomas

This whitepaper explores the post exploitation of Metasploit using a generic shell rather than the meterpreter shell.

“Metasploit”ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of Metasploit Framework make the penetrators’ life quite easier. It gives a ton of other options and toolsets for exploit development too. This document mainly explores the post exploitation modules with generic shell rather than meterpreter shell.

Download:

http://packetstormsecurity.com/files/download/121937/Windows_Meterpreterless_PostExploit.pdf

Sursa: Windows Meterpreter-less Post Exploitation ? Packet Storm

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...