Powershell Payload Execution
This module generates a dynamic executable on the session host using .NET templates. Code is pulled from C# templates and impregnated with a payload before being sent to a modified PowerShell session with .NET 4 loaded. The compiler builds the executable (standard or Windows service) in memory and produces a binary which can be started/installed and downloaded for later use. After compilation the PoweShell session can also sign the executable if provided a path the a .pfx formatted certificate.
- RageLtMan <rageltman [at] sempervictus>
- Matt "hostess" Andreko
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/windows/local/ps_persist msf exploit(ps_persist) > show targets ...targets... msf exploit(ps_persist) > set TARGET <target-id> msf exploit(ps_persist) > show options ...show and set options... msf exploit(ps_persist) > exploit