module

Windows Manage Inject in Memory Multiple Payloads

Disclosed
N/A
Created
May 30, 2018

Description

This module will inject into several processes a given
payload and connect to a given list of IP addresses.
The module works with a given lists of IP addresses and
process IDs if no PID is given it will start the given
process in the advanced options and inject the selected
payload into the memory of the created module.

Authors

Carlos Perez carlos_perez@darkoperator.com
David Kennedy "ReL1K" kennedyd013@gmail.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use post/windows/manage/multi_meterpreter_inject
msf post(multi_meterpreter_inject) > show actions
...actions...
msf post(multi_meterpreter_inject) > set ACTION < action-name >
msf post(multi_meterpreter_inject) > show options
...show and set options...
msf post(multi_meterpreter_inject) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.