OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
nmap
/
nselib
/
data
/
psexec
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
08/07/2020 12:36:00 PM
rwxr-xr-x
📄
README
1.03 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
backdoor.lua
921 bytes
04/16/2018 01:11:39 AM
rw-r--r--
📄
default.lua
5.3 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
drives.lua
1.3 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
examples.lua
2.3 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
experimental.lua
712 bytes
04/16/2018 01:11:39 AM
rw-r--r--
📄
network.lua
4.01 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
nmap_service.c
10.55 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
nmap_service.vcproj
3.91 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pwdump.lua
1.8 KB
04/16/2018 01:11:39 AM
rw-r--r--
Editing: pwdump.lua
Close
---This config file is designed for running password-dumping scripts. So far, -- it supports pwdump6 2.0.0 and fgdump. -- -- Note that none of these modules are included with Nmap by default. -- Any variable in the 'config' table in smb-psexec.nse can be overriden in the -- 'overrides' table. Most of them are not really recommended, such as the host, -- key, etc. overrides = {} --overrides.timeout = 40 modules = {} local mod --mod = {} --mod.upload = true --mod.name = "PwDump6 2.0.0" --mod.program = "PwDump.exe" --mod.args = "localhost" --mod.maxtime = 10 --mod.include_stderr = false --mod.url = "http://www.foofus.net/fizzgig/pwdump/" --table.insert(modules, mod) ---Uncomment if you'd like to use PwDump6 1.7.2 (considered obsolete, but still works). -- Note that for some reason, this and 'fgdump' don't get along (fgdump only produces a blank -- file if these are run together) --mod = {} --mod.upload = true --mod.name = "PwDump6 1.7.2" --mod.program = "PwDump-1.7.2.exe" --mod.args = "localhost" --mod.maxtime = 10 --mod.include_stderr = false --mod.extrafiles = {"servpw.exe", "lsremora.dll"} --mod.url = "http://www.foofus.net/fizzgig/pwdump/" --table.insert(modules, mod) -- Warning: the danger of using fgdump is that it always write the output to the harddrive unencrypted; -- this makes it more obvious that an attack has occurred. mod = {} mod.upload = true mod.name = "FgDump" mod.program = "fgdump.exe" mod.args = "-c -l fgdump.log" mod.maxtime = 10 mod.url = "http://www.foofus.net/fizzgig/fgdump/" mod.tempfiles = {"fgdump.log"} mod.outfile = "127.0.0.1.pwdump" table.insert(modules, mod)