How to Save Exploit Generated Website-Files Externally (To a Personally Chosen Directory)?

Jul 16, 2015 11:45 AM

I need to test variouse Adobe Flash (and other) exploits per website drive-by on VMs... The problem is, that I cannot always let each VM connect to a attacker VM web-server (because when it is automated, this would cause it to be very slow and I dont want any network connections), BUT it seams like Metasploit generates a URL to the exploiting script AND I have no clue how to extract these scripts.

-- I could go through all the generated websites and manually copy the source-code of each site, BUT I think that the scripts open up or generate fitting scripts (depending on the browser and the versions of the software) on the fly, meaning, that I would download scripts that have no use for me.

Does someone know how I can save all the files / scripts I need for such drive-by exploits to a directory, which I can move to my VMs, to execute them there. (I dont need actual sessions / connections, since I am testing which antivirus modules react).

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!