metasploit-framework/documentation/modules/post/windows/gather/enum_proxy.md

1.4 KiB

Vulnerable Application

This module pulls a user's proxy settings. If neither RHOST or SID are set it pulls the current user, else it will pull the user's settings for the specified SID and target host.

Verification Steps

  1. Start msfconsole
  2. Get a session on a Windows host
  3. Do: use post/windows/gather/enum_proxy
  4. Do: set session <session id>
  5. Do: run
  6. You should receive system proxy information

Options

RHOST

Remote host to clone settings to (defaults to local)

SID

SID of user to clone settings to (SYSTEM is S-1-5-18) (default: blank)

Scenarios

Windows Server 2016 (x86_64)

msf6 > use post/windows/gather/enum_proxy
msf6 post(windows/gather/enum_proxy) > set session 1
session => 1
msf6 post(windows/gather/enum_proxy) > run

[*] Proxy Counter = 3
[*] Setting: WPAD and Proxy server
[*] Proxy Server: http=127.0.0.1:80;https=127.0.0.1:80;ftp=127.0.0.1:80
[*] Post module execution completed

Windows 7 SP1 (x86_64)

msf6 > use post/windows/gather/enum_proxy
msf6 post(windows/gather/enum_proxy) > set session 1
session => 1
msf6 post(windows/gather/enum_proxy) > run

[*] Proxy Counter = 77
[*] Setting: WPAD, Proxy server and AutoConfigure script
[*] Proxy Server: http=127.0.0.1:8080;https=127.0.0.1:8080;ftp=127.0.0.1:8080
[*] AutoConfigURL: http://corp.local/wpad.dat
[*] Post module execution completed
msf6 post(windows/gather/enum_proxy) >