Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to use post modules like post/windows/gather/arp in a meterpreter session #94

Open
Cergical opened this issue Jul 17, 2023 · 1 comment

Comments

@Cergical
Copy link

Hello

I am trying to use pymetasploit3 library to automate commands in the msfconsole. I have setup a multi handler using meterpreter/reverse_tcp and I am able to receive a reverse meterpreter shell, however I am having great difficulty in trying to use the post modules such as post/windows/gather/arp_scanner in the meterpreter shell but it seems I can't do that. Does anyone know how to do this ? can you please help me ?

@wrinklykong
Copy link

I'm not sure about using posts WITHIN the meterpreter shell, however I can give guidance on executing posts with Pymetasploit.

To use posts with Pymetasploit3, you will have to create a PostModule object similar to using an exploit or payload and execute it. For most posts the only option you need to give it is the Session ID number, so you could grab a list of the currently active sessions with client.sessions.list and find the SID to connect to in the post. Hope it helps.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants