module

Windows Gather Virtual Environment Detection

Disclosed
N/A
Created
May 30, 2018

Description

This module attempts to determine whether the system is running
inside of a virtual environment and if so, which one. This
module supports detection of Hyper-V, VMWare, VirtualBox, Xen, QEMU,
and Parallels.

Authors

Carlos Perez carlos_perez@darkoperator.com
Aaron Soto aaron_soto@rapid7.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use post/windows/gather/checkvm
msf post(checkvm) > show actions
...actions...
msf post(checkvm) > set ACTION < action-name >
msf post(checkvm) > show options
...show and set options...
msf post(checkvm) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.