module

Wireshark console.lua Pre-Loading Script Execution

Disclosed
2011-07-18
Created
2018-05-30

Description

This module exploits a vulnerability in Wireshark 1.6 or less. When opening a
pcap file, Wireshark will actually check if there's a 'console.lua' file in the same
directory, and then parse/execute the script if found. Versions affected by this
vulnerability: 1.6.0 to 1.6.1, 1.4.0 to 1.4.8

Authors

Haifei Li
sinn3r sinn3r@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/misc/wireshark_lua
msf exploit(wireshark_lua) > show targets
...targets...
msf exploit(wireshark_lua) > set TARGET < target-id >
msf exploit(wireshark_lua) > show options
...show and set options...
msf exploit(wireshark_lua) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.