part I Windows VNC Injection :
i all,
When using a VNC Injection payload, and obtaining a full access on the
victim machine after an exploit, a command shell is spawned on the
remote machine with a pretty visible blue background. Is there anyway
to stop this ?. I tried modifying the following code in
framework\modules\payloads\stages\windows\vncinject.rb
register_advanced_options(
[
OptBool.new('DisableCourtesyShell',
[
false,
"Disables the Metasploit Courtesy shell",
false
])
], VncInject)
changing false parametres to true offcourse, but i cannot seem to hide
the command shell.
Any ideas ?
Sunday, September 13, 2009
Subscribe to:
Posts (Atom)