part I Windows VNC Injection :
i all,
When using a VNC Injection payload, and obtaining a full access on the
victim machine after an exploit, a command shell is spawned on the
remote machine with a pretty visible blue background. Is there anyway
to stop this ?. I tried modifying the following code in
framework\modules\payloads\stages\windows\vncinject.rb
register_advanced_options(
   [
    OptBool.new('DisableCourtesyShell',
     [
      false,
      "Disables the Metasploit Courtesy shell",
      false
     ])
   ], VncInject)
changing false parametres to true offcourse, but i cannot seem to hide
the command shell.
Any ideas ?
Sunday, September 13, 2009
Subscribe to:
Comments (Atom)
