Sunday, September 13, 2009

Metasploit

part I Windows VNC Injection :

i all,

When using a VNC Injection payload, and obtaining a full access on the
victim machine after an exploit, a command shell is spawned on the
remote machine with a pretty visible blue background. Is there anyway
to stop this ?. I tried modifying the following code in
framework\modules\payloads\stages\windows\vncinject.rb

register_advanced_options(
[
OptBool.new('DisableCourtesyShell',
[
false,
"Disables the Metasploit Courtesy shell",
false
])
], VncInject)

changing false parametres to true offcourse, but i cannot seem to hide
the command shell.
Any ideas ?

No comments:

Post a Comment