Post-exploitation with RailGun
RailGun sounds like a top-notch gun spitting out bullets faster than light; however, this is not the case. RailGun allows you to make calls to a Windows API without the need to compile your own DLL. It supports various Windows DLL files and eases the way for us to perform system-level tasks on the victim machine. Let's see how we can perform various tasks using RailGun, and carry out some advanced post-exploitation with it.
Manipulating Meterpreter through Interactive Ruby Shell
RailGun requires the irb
shell to be loaded into Meterpreter. Let's look at how we can jump to the irb
shell from Meterpreter:
We can see in the preceding screenshot that merely typing in irb
from Meterpreter allows us to drop in the Ruby-interactive shell. We can perform a variety of tasks with the Ruby shell from here. Metasploit also informs us that the client
variable...