Skip to content

Commit

Permalink
Fix Meterpreter spelling mistake
Browse files Browse the repository at this point in the history
  • Loading branch information
adfoster-r7 committed Oct 12, 2021
1 parent f23c51b commit 9f0804c
Show file tree
Hide file tree
Showing 4 changed files with 7 additions and 7 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ The expected structure includes a "type" attribute to instruct the server which
9. Do: ```check```
10. **Verify** that you are seeing `The target appears to be vulnerable` in the console
11. Do: ```exploit```
12. **Verify** that you get a meterpeter shell
12. **Verify** that you get a Meterpreter shell

### v9.1.1
1. Install the application
Expand All @@ -89,7 +89,7 @@ The expected structure includes a "type" attribute to instruct the server which
14. Do: ```check```
15. **Verify** that you are seeing `The target appears to be vulnerable` in the console
16. Do: ```exploit```
17. **Verify** that you get a meterpeter shell
17. **Verify** that you get a Meterpreter shell

### v9.2.0 - v9.2.1
1. Install the application
Expand All @@ -113,7 +113,7 @@ The expected structure includes a "type" attribute to instruct the server which
19. Do: ```check```
20. **Verify** that you are seeing `The target appears to be vulnerable` in the console
21. Do: ```exploit```
22. **Verify** that you get a meterpeter shell
22. **Verify** that you get a Meterpreter shell

### v9.2.2 - 9.3.0-RC
In these versions, the `userId` value was changed to be a randomly generated GUID. This means that only the first part of the verification plaintext is known. By providing a list of several verification codes, it is possible to reduce the nubmer of potential encryption key values to a feasible amount. Once the list of encryption keys has been reduced, the module will test each key until an HTTP callback is received on port `8080` that indicates which key worked. Then, the final exploit payload will be encrypted using the recovered key and sent to the server, resulting in a shell.
Expand All @@ -140,7 +140,7 @@ The expected structure includes a "type" attribute to instruct the server which
20. Do: ```check```
21. **Verify** that you are seeing `The target appears to be vulnerable` in the console.
22. Do: ```exploit```
23. **Verify** that you get a meterpeter shell
23. **Verify** that you get a Meterpreter shell

## Options

Expand Down
2 changes: 1 addition & 1 deletion documentation/modules/post/multi/manage/autoroute.md
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ $ sudo proxychains nmap -n -sT -sV -PN -p 445 10.10.125.0/24
```

### Combined With Default Route
Using the default route option along with the Socks proxy and Proxychains, you can browse the internet as the compromised host. This is possible because adding a default route to a Meterpeter session will cause all TCP/IP traffic; that is not otherwise specified in Metasploit's routing table, to route through that session. This is easy to set up and test.
Using the default route option along with the Socks proxy and Proxychains, you can browse the internet as the compromised host. This is possible because adding a default route to a Meterpreter session will cause all TCP/IP traffic; that is not otherwise specified in Metasploit's routing table, to route through that session. This is easy to set up and test.

You need a Windows Meterpreter session on a host that has a different public IP address than your attacking machine.

Expand Down
2 changes: 1 addition & 1 deletion modules/post/windows/manage/vmdk_mount.rb
Original file line number Diff line number Diff line change
Expand Up @@ -240,7 +240,7 @@ def open_mountserver(path)
session.sys.process.kill(p["pid"])
sleep(1)
rescue ::Rex::Post::Meterpreter::RequestError => error
print_error("The #{mount_bin} instance depending on Meterpeter could not be killed")
print_error("The #{mount_bin} instance depending on Meterpreter could not be killed")
return false
end
end
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/remotewinenum.rb
Original file line number Diff line number Diff line change
Expand Up @@ -139,7 +139,7 @@ def helpmsg
print("Remote Windows Enumeration Meterpreter Script\n" +
"This script will enumerate windows hosts in the target enviroment\n" +
"given a username and password or using the credential under witch\n" +
"Meterpeter is running using WMI wmic windows native tool.\n" +
"Meterpreter is running using WMI wmic windows native tool.\n" +
"Usage:\n" +
@@exec_opts.usage)
end
Expand Down

0 comments on commit 9f0804c

Please sign in to comment.