Post Exploit Commands
Credit for most of the below comes from Mubix who has created a few documents (on google docs) that lists what to actually do once shell access has been gained. You can read more about it here and find...
View ArticleRecreating pattern_create.rb in python!
So, when you don’t have metasploit or ruby in your environment and you need to run pattern_create.rb what do you do? Well if you’ve got Python available you simply rewrite the code in python. Here’s...
View Article