module
Windows Persistent Service Installer
Disclosed | Created |
---|---|
10/20/2018 | 03/19/2019 |
Disclosed
10/20/2018
Created
03/19/2019
Description
This Module will generate and upload an executable to a remote host, next will make it a persistent service.
It will create a new service which will start the payload whenever the service is running. Admin or system
privilege is required.
It will create a new service which will start the payload whenever the service is running. Admin or system
privilege is required.
Author
Green-m
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/windows/local/persistence_service msf /(e) > show actions ...actions... msf /(e) > set ACTION < action-name > msf /(e) > show options ...show and set options... msf /(e) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.