You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am trying to use pymetasploit3 library to automate commands in the msfconsole. I have setup a multi handler using meterpreter/reverse_tcp and I am able to receive a reverse meterpreter shell, however I am having great difficulty in trying to use the post modules such as post/windows/gather/arp_scanner in the meterpreter shell but it seems I can't do that. Does anyone know how to do this ? can you please help me ?
The text was updated successfully, but these errors were encountered:
I'm not sure about using posts WITHIN the meterpreter shell, however I can give guidance on executing posts with Pymetasploit.
To use posts with Pymetasploit3, you will have to create a PostModule object similar to using an exploit or payload and execute it. For most posts the only option you need to give it is the Session ID number, so you could grab a list of the currently active sessions with client.sessions.list and find the SID to connect to in the post. Hope it helps.
Hello
I am trying to use pymetasploit3 library to automate commands in the msfconsole. I have setup a multi handler using meterpreter/reverse_tcp and I am able to receive a reverse meterpreter shell, however I am having great difficulty in trying to use the post modules such as post/windows/gather/arp_scanner in the meterpreter shell but it seems I can't do that. Does anyone know how to do this ? can you please help me ?
The text was updated successfully, but these errors were encountered: