We have hosted the application myauxiliary rb in order to run this application in our online workstations with Wine or directly.
Quick description about myauxiliary rb:
This auxiliary module needs [metasploit] framework installed.This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script,
so we need to exploit a target first in order to use it.
Affected platforms:
Windows OS
(all versions above windows vista)
Read my WIKI for further info:
https: //sourceforge.net/p/myauxiliarymete/wiki/Home/
Features:
- SESSION => the session to run the module on
- CLEAR => clean IDS event logfiles on target host
- GETPRIVS => elevate meterpreter to AUTHORITY/SYSTEM
- APPL => enumerate intalled applications
- LOGIN => enumerate Recently logged on users
- HOST => dump hostfile of taget machine to loot folder
- HOSTFILE => add entrys to target hostfile <ip-add> <domain>
- DELHOST => revert target hostfile to default settings
- MSG => display message in target desktop
- EXECUTE => execute an arbitary cmd command on target host
- LABEL => rename the c: harddrive display name
- UACSET => check if UAC is enabled and is level running
- UACBYPASS => bypass UAC setting using regedit
- SETCH => backdoor setch.exe on target system
- extra module includes:
- root3.rb => ruby script to execute a list of cmd commands on target host
Audience: Other Audience, Security Professionals, Security.
User interface: Gnome, KDE.
Programming Language: Ruby.
.
©2024. Winfy. All Rights Reserved.
By OD Group OU – Registry code: 1609791 -VAT number: EE102345621.