Vulnerability & Exploit Database

Back to search

Multi Recon Local Exploit Suggester

This module suggests local meterpreter exploits that can be used. The exploits are suggested based on the architecture and platform that the user has a shell opened as well as the available exploits in meterpreter. It's important to note that not all local exploits will be fired. Exploits are chosen based on these conditions: session type, platform, architecture, and required default options.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

post/multi/recon/local_exploit_suggester

Authors

  • sinn3r <sinn3r [at] metasploit.com>
  • Mo

Platforms

  • unknown
  • windows
  • netware
  • android
  • java
  • r
  • ruby
  • linux
  • cisco
  • juniper
  • solaris
  • osx
  • bsd
  • openbsd
  • bsdi
  • netbsd
  • freebsd
  • aix
  • hpux
  • irix
  • unix
  • php
  • javascript
  • python
  • nodejs
  • firefox
  • mainframe
  • multi
  • hardware
  • apple_ios

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use post/multi/recon/local_exploit_suggester msf post(local_exploit_suggester) > sessions ...sessions... msf post(local_exploit_suggester) > set SESSION <session-id> msf post(local_exploit_suggester) > show options ...show and set options... msf post(local_exploit_suggester) > run