Multi Recon Local Exploit Suggester
This module suggests local meterpreter exploits that can be used. The exploits are suggested based on the architecture and platform that the user has a shell opened as well as the available exploits in meterpreter. It's important to note that not all local exploits will be fired. Exploits are chosen based on these conditions: session type, platform, architecture, and required default options.
- sinn3r <sinn3r [at] metasploit.com>
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use post/multi/recon/local_exploit_suggester msf post(local_exploit_suggester) > sessions ...sessions... msf post(local_exploit_suggester) > set SESSION <session-id> msf post(local_exploit_suggester) > show options ...show and set options... msf post(local_exploit_suggester) > run