![]() ![]() multicommand.rb – Script for running multiple commands on Windows 2003, Windows Vistaand Windows XP and Windows 2008 targets.migrate – Moves the meterpreter service to another process.metsvc.rb – Delete one meterpreter service and start another.killav.rb – Terminates nearly every antivirus software on victim.keylogrecorder.rb – Script for running keylogger and saving all the keystrokes.hostedit.rb – Script for adding entries in to the Windows Hosts file.hashdump.rb – Grabs password hashes from the SAM.get_valid_community.rb – Gets a valid community string from SNMP.gettelnet.rb – Checks to see whether telnet is installed.get_pidgen_creds.rb – Script for extracting configured services with username and passwords.get_local_subnets.rb – Get a list of local subnets based on the host’s routes.getgui.rb – Script to enable Windows RDP.getfilezillacreds.rb – Script for extracting servers and credentials from Filezilla.get_env.rb – Script for extracting a list of all System and User environment variables.Provides also the option to kill the processes of detected products and disable the built-in firewall. getcountermeasure.rb – Script for detecting AV, HIPS, Third Party Firewalls, DEP Configuration and Windows Firewall configuration.get_application_list.rb – Script for extracting a list of installed applications and their version.file_collector.rb – Script for searching and downloading files that match a specific pattern.event_manager.rb – Show information about Event Logs on the target system and their configuration.enum_vmware.rb – Enumerates VMware configurations for VMware products.enum_shares.rb – Script for Enumerating shares offered and history of mounted shares.enum_putty.rb – Enumerates Putty connections.enum_powershell_env.rb – Enumerates PowerShell and WSH configurations. enum_logged_on_users.rb – Script for enumerating current logged users and users that have logged in to the system. enum_firefox.rb – Script for extracting data from Firefox.enum_chrome.rb – Script to extract data from a chrome installation.A new process allows the session to take “risky” actions that might get the process killed by A/V, giving a meterpreter session to another controller, or start a keylogger on another process. duplicate.rb – Uses a meterpreter session to spawn a new meterpreter session in a different process.This info may help you target additional systems. lnk files contain time stamps, file locations, including share names, volume serial #s and more. lnk files from a user’s recent documents folder and Microsoft Office’s Recent documents folder, if present. domain_list_gen.rb – Script for extracting domain admin account list for use.credcollect.rb – Script to harvest credentials found on the host and store them in the database.checkvm.rb – Script for detecting if target host is a virtual machine.autoroute.rb – Meterpreter session without having to background the current session.arp_scanner.rb – Script for performing an ARP’s Scan Discovery.If you find errors or typos, please feel free to post them here, so I will try correct them as soon as humanly possible. This list attempts to provide you with a complete list of scripts as of this writing. Please note that new meterpreter scripts are being developed every day. You will want to bookmark this page too, as no one remembers all these scripts and it’s likely you will want to return here at a later time to find a particular script for a particular hack. In this post, I will try to provide you the most complete list and description available anywhere on the web. These commands are essential to running Metasploit’s meterpreter, but in recent years, numerous hackers and security pros have developed scripts that we can run from the meterpreter that can be much more effective and malicious. Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on.In a previous post, I had provided you a cheat sheet of meterpreter commands. The Ultimate List of Hacking Scripts for Metasploit’s Meterpreter ![]()
0 Comments
Leave a Reply. |