Vulnerability & Exploit Database

Back to search

Powershell Payload Execution

This module generates a dynamic executable on the session host using .NET templates. Code is pulled from C# templates and impregnated with a payload before being sent to a modified PowerShell session with .NET 4 loaded. The compiler builds the executable (standard or Windows service) in memory and produces a binary which can be started/installed and downloaded for later use. After compilation the PoweShell session can also sign the executable if provided a path the a .pfx formatted certificate.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/local/ps_persist

Authors

  • RageLtMan <rageltman [at] sempervictus>
  • Matt "hostess" Andreko

Targets

  • Universal

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/local/ps_persist msf exploit(ps_persist) > show targets ...targets... msf exploit(ps_persist) > set TARGET <target-id> msf exploit(ps_persist) > show options ...show and set options... msf exploit(ps_persist) > exploit