File tree Expand file tree Collapse file tree 3 files changed +18
-9
lines changed
Expand file tree Collapse file tree 3 files changed +18
-9
lines changed Original file line number Diff line number Diff line change 66class MetasploitModule < Msf ::Auxiliary
77 include Msf ::Exploit ::Remote ::TFTPServer
88 include Msf ::Auxiliary ::Report
9+ include Msf ::Module ::Deprecated
10+ moved_from 'auxiliary/server/pxeexploit'
911
1012 def initialize
1113 super (
12- 'Name' => 'PXE Boot Exploit Server' ,
14+ 'Name' => 'PXE Boot Server' ,
1315 'Description' => %q{
1416 This module provides a PXE server, running a DHCP and TFTP server.
15- The default configuration loads a linux kernel and initrd into memory that
17+ The default configuration loads a Linux kernel and initrd into memory that
1618 reads the hard drive; placing a payload to install metsvc, disable the
1719 firewall, and add a new user metasploit on any Windows partition seen,
18- and add a uid 0 user with username and password metasploit to any linux
20+ and add a uid 0 user with username and password metasploit to any Linux
1921 partition seen. The windows user will have the password p@SSw0rd!123456
2022 (in case of complexity requirements) and will be added to the administrators
2123 group.
Original file line number Diff line number Diff line change @@ -8,16 +8,20 @@ class MetasploitModule < Msf::Exploit::Remote
88
99 include Msf ::Exploit ::Remote ::TFTPServer
1010 include Msf ::Auxiliary ::Report
11+ include Msf ::Module ::Deprecated
12+ moved_from 'exploits/windows/local/pxeexploit'
1113
1214 def initialize
1315 super (
14- 'Name' => 'PXE Exploit Server' ,
16+ 'Name' => 'PXE Boot Server' ,
1517 'Description' => %q{
1618 This module provides a PXE server, running a DHCP and TFTP server.
17- The default configuration loads a linux kernel and initrd into memory that
19+ The default configuration loads a Linux kernel and initrd into memory that
1820 reads the hard drive; placing the payload on the hard drive of any Windows
1921 partition seen.
2022
23+ See auxiliary/server/pxe_boot for a version to deliver a more payloads.
24+
2125 Note: the displayed IP address of a target is the address this DHCP server
2226 handed out, not the "normal" IP address the host uses.
2327 } ,
Original file line number Diff line number Diff line change 55
66class MetasploitModule < Msf ::Post
77 include Msf ::Auxiliary ::Report
8+ include Msf ::Module ::Deprecated
9+ moved_from 'post/windows/manage/pxeexploit'
810
911 def initialize
1012 super (
11- 'Name' => 'Windows Manage PXE Exploit Server' ,
13+ 'Name' => 'Windows Manage PXE Boot Server' ,
1214 'Description' => %q{
1315 This module provides a PXE server, running a DHCP and TFTP server.
14- The default configuration loads a linux kernel and initrd into memory that
16+ The default configuration loads a Linux kernel and initrd into memory that
1517 reads the hard drive; placing a payload to install metsvc, disable the
1618 firewall, and add a new user metasploit on any Windows partition seen,
17- and add a uid 0 user with username and password metasploit to any linux
19+ and add a uid 0 user with username and password metasploit to any Linux
1820 partition seen. The windows user will have the password p@SSw0rd!123456
1921 (in case of complexity requirements) and will be added to the administrators
2022 group.
2123
22- See exploit/windows/misc/pxesploit for a version to deliver a specific payload.
24+ See exploit/windows/local/pxe_boot for a version to deliver a specific Windows payload.
25+ See auxiliary/server/pxe_boot for a version to deliver a more payloads, including non-Windows.
2326
2427 Note: the displayed IP address of a target is the address this DHCP server
2528 handed out, not the "normal" IP address the host uses.
You can’t perform that action at this time.
0 commit comments