forked from Trietptm-on-Security/2FA-Postmortem
-
Notifications
You must be signed in to change notification settings - Fork 0
sashka3076/2FA-Postmortem
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
# 2FA-Postmortem Parse the meterpreter session to 2FAssassin msf > search postmortem Matching Modules ================ Name Disclosure Date Rank Description ---- --------------- ---- ----------- post/2fassassin/postmortem normal 2FA-Postmortem msf > info post/2fassassin/postmortem _ _ _( ) ( )_ (_, | __ __ | ,_) |'| / ^ | /'/ '|'|,/| |,/'/' '|| [] [] |/' (_ /^| _) | ~ / /HHHHH| /'/{^^^}|'| _,/'/' ^^^ '|'|,_ (_, | | ,_) (_) (_) +----------------+ | 2FA-Postmortem | +----------------+ Name: 2FA-Postmortem Module: post/2fassassin/postmortem Platform: Linux Arch: x86 Rank: Normal Provided by: Maxwell Koh Basic options: Name Current Setting Required Description ---- --------------- -------- ----------- CMDEXEC yes Command to execute SESSION yes The session to run this module on. SYSTEMINFO TRUE yes True if you want to get system info Description: Parse meterpreter session to 2FAssassin. There is no need to run 2FAassasin separately. Disregard which method you applied to exploit into the target system, you can always bring the Meterpreter session back to the 2FAssassin instance. msf >
About
Parsing the meterpreter session to 2FAssassin via 2FA-Postmortem
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
Languages
- Ruby 100.0%