CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/windows/gather/enum_proxy.md
Views: 11788

Vulnerable Application

This module pulls a user's proxy settings. If neither RHOST or SID are set it pulls the current user, else it will pull the user's settings for the specified SID and target host.

Verification Steps

  1. Start msfconsole

  2. Get a session on a Windows host

  3. Do: use post/windows/gather/enum_proxy

  4. Do: set session <session id>

  5. Do: run

  6. You should receive system proxy information

Options

RHOST

Remote host to clone settings to (defaults to local)

SID

SID of user to clone settings to (SYSTEM is S-1-5-18) (default: blank)

Scenarios

Windows Server 2016 (x86_64)

msf6 > use post/windows/gather/enum_proxy msf6 post(windows/gather/enum_proxy) > set session 1 session => 1 msf6 post(windows/gather/enum_proxy) > run [*] Proxy Counter = 3 [*] Setting: WPAD and Proxy server [*] Proxy Server: http=127.0.0.1:80;https=127.0.0.1:80;ftp=127.0.0.1:80 [*] Post module execution completed

Windows 7 SP1 (x86_64)

msf6 > use post/windows/gather/enum_proxy msf6 post(windows/gather/enum_proxy) > set session 1 session => 1 msf6 post(windows/gather/enum_proxy) > run [*] Proxy Counter = 77 [*] Setting: WPAD, Proxy server and AutoConfigure script [*] Proxy Server: http=127.0.0.1:8080;https=127.0.0.1:8080;ftp=127.0.0.1:8080 [*] AutoConfigURL: http://corp.local/wpad.dat [*] Post module execution completed msf6 post(windows/gather/enum_proxy) >