Forum Thread: How to Save Exploit Generated Website-Files Externally (To a Personally Chosen Directory)?

I need to test variouse Adobe Flash (and other) exploits per website drive-by on VMs... The problem is, that I cannot always let each VM connect to a attacker VM web-server (because when it is automated, this would cause it to be very slow and I dont want any network connections), BUT it seams like Metasploit generates a URL to the exploiting script AND I have no clue how to extract these scripts.

-- I could go through all the generated websites and manually copy the source-code of each site, BUT I think that the scripts open up or generate fitting scripts (depending on the browser and the versions of the software) on the fly, meaning, that I would download scripts that have no use for me.

Does someone know how I can save all the files / scripts I need for such drive-by exploits to a directory, which I can move to my VMs, to execute them there. (I dont need actual sessions / connections, since I am testing which antivirus modules react).

Join the Next Reality AR Community

Get the latest in AR — delivered straight to your inbox.

Be the First to Respond

Share Your Thoughts

  • Hot
  • Active