module

Windows Gather Service Info Enumeration

Disclosed
N/A
Created
May 30, 2018

Description

This module will query the system for services and display name and
configuration info for each returned service. It allows you to
optionally search the credentials, path, or start type for a string
and only return the results that match. These query operations are
cumulative and if no query strings are specified, it just returns all
services. NOTE: If the script hangs, windows firewall is most likely
on and you did not migrate to a safe process (explorer.exe for
example).

Authors

Keith Faber
Kx499

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use post/windows/gather/enum_services
msf post(enum_services) > show actions
...actions...
msf post(enum_services) > set ACTION < action-name >
msf post(enum_services) > show options
...show and set options...
msf post(enum_services) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.