Skip to content

Commit 3576e2b

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 069de9f commit 3576e2b

File tree

1 file changed

+53
-46
lines changed

1 file changed

+53
-46
lines changed

db/modules_metadata_base.json

Lines changed: 53 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -190434,52 +190434,6 @@
190434190434
"needs_cleanup": null,
190435190435
"actions": []
190436190436
},
190437-
"exploit_windows/local/persistence_service": {
190438-
"name": "Windows Persistent Service Installer",
190439-
"fullname": "exploit/windows/local/persistence_service",
190440-
"aliases": [],
190441-
"rank": 600,
190442-
"disclosure_date": "2018-10-20",
190443-
"type": "exploit",
190444-
"author": [
190445-
"Green-m <greenm.xxoo@gmail.com>"
190446-
],
190447-
"description": "This Module will generate and upload an executable to a remote host, next will make it a persistent service.\n It will create a new service which will start the payload whenever the service is running. Admin or system\n privilege is required.",
190448-
"references": [
190449-
"URL-https://github.com/rapid7/metasploit-framework/blob/master/external/source/metsvc/src/metsvc.cpp"
190450-
],
190451-
"platform": "Windows",
190452-
"arch": "",
190453-
"rport": null,
190454-
"autofilter_ports": [],
190455-
"autofilter_services": [],
190456-
"targets": [
190457-
"Windows"
190458-
],
190459-
"mod_time": "2025-06-23 12:43:46 +0000",
190460-
"path": "/modules/exploits/windows/local/persistence_service.rb",
190461-
"is_install_path": true,
190462-
"ref_name": "windows/local/persistence_service",
190463-
"check": false,
190464-
"post_auth": false,
190465-
"default_credential": false,
190466-
"notes": {
190467-
"Reliability": [
190468-
"unknown-reliability"
190469-
],
190470-
"Stability": [
190471-
"unknown-stability"
190472-
],
190473-
"SideEffects": [
190474-
"unknown-side-effects"
190475-
]
190476-
},
190477-
"session_types": [
190478-
"meterpreter"
190479-
],
190480-
"needs_cleanup": null,
190481-
"actions": []
190482-
},
190483190437
"exploit_windows/local/plantronics_hub_spokesupdateservice_privesc": {
190484190438
"name": "Plantronics Hub SpokesUpdateService Privilege Escalation",
190485190439
"fullname": "exploit/windows/local/plantronics_hub_spokesupdateservice_privesc",
@@ -199569,6 +199523,59 @@
199569199523
"needs_cleanup": null,
199570199524
"actions": []
199571199525
},
199526+
"exploit_windows/persistence/service": {
199527+
"name": "Windows Persistent Service Installer",
199528+
"fullname": "exploit/windows/persistence/service",
199529+
"aliases": [
199530+
"exploits/windows/local/persistence_service"
199531+
],
199532+
"rank": 600,
199533+
"disclosure_date": "2018-10-20",
199534+
"type": "exploit",
199535+
"author": [
199536+
"Green-m <greenm.xxoo@gmail.com>",
199537+
"h00die"
199538+
],
199539+
"description": "This Module will generate and upload an executable to a remote host.\n It will create a new service which will start the payload whenever the service is running. Admin or system\n privilege is required.",
199540+
"references": [
199541+
"URL-https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/new-service?view=powershell-7.5",
199542+
"URL-https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc754599(v=ws.11)",
199543+
"ATT&CK-T1543.003",
199544+
"ATT&CK-T1569.002"
199545+
],
199546+
"platform": "Windows",
199547+
"arch": "",
199548+
"rport": null,
199549+
"autofilter_ports": [],
199550+
"autofilter_services": [],
199551+
"targets": [
199552+
"Windows"
199553+
],
199554+
"mod_time": "2025-11-05 16:38:46 +0000",
199555+
"path": "/modules/exploits/windows/persistence/service.rb",
199556+
"is_install_path": true,
199557+
"ref_name": "windows/persistence/service",
199558+
"check": true,
199559+
"post_auth": false,
199560+
"default_credential": false,
199561+
"notes": {
199562+
"Reliability": [
199563+
"event-dependent",
199564+
"repeatable-session"
199565+
],
199566+
"Stability": [
199567+
"crash-safe"
199568+
],
199569+
"SideEffects": [
199570+
"ioc-in-logs"
199571+
]
199572+
},
199573+
"session_types": [
199574+
"meterpreter"
199575+
],
199576+
"needs_cleanup": null,
199577+
"actions": []
199578+
},
199572199579
"exploit_windows/persistence/startup_folder": {
199573199580
"name": "Windows Persistent Startup Folder",
199574199581
"fullname": "exploit/windows/persistence/startup_folder",

0 commit comments

Comments
 (0)