30 lines
1.2 KiB
Markdown

# Metasploit-Autopwn
* Author: Mohamed A. Baset - @SymbianSyMoh - Seekurity.com
* Version: Version 0.1
* Target: All OS / services
## Description:
Runs Metasploit db_autopwn module against the dhcp connected client to the Bash Bunny device exploiting locked and unlocked machines that running vulnerable OSes or services.
## Configuration/Prequisities:
1. Ruby 2.4.1 installed via 'rbenv' (the best to have ruby installed without any problems)
2. You must have metasploit installation up and running in path /toos/metasploit-framework/
3. Copy auto_pwn.rc metasploit resources file from the payload folder to /tools/ by SSHing into your bunny
4. One-time fix for adding user "postgres" to the network user groups (should be done by HAK5 folks in the first place)
## STATUS
| LED | Status |
| ------------------ | -----------------------------------------------|
| Setup | Setting up stuff |
| ATTACK | Running Metasploit Autopwn Module |
| FINISH | Attack Finished (hopefully we got some shells) |
## Discussion
https://forums.hak5.org/topic/41737-metasploit-framework-with-db_autopwn-module-on-bashbunny/