Cyberlabz
  • The Land of Cyber
    • 📡The Junk Drawer
    • 🤯Hack Pods
  • 🕵️Blue Team
    • How to Create your Own Elastic XDR Solution
    • Elastic Dump
    • Network Forensics with FOSS
    • Velociraptor Hunt VQL's
    • PowerShell One-Liners
  • 🧅Security Onion Playbook SIGMA Rules
    • Hunting with Security Onion Playbook
  • 🙃Hunting Cobalt Strike with SO2
  • 🖥️“Posh Easy Win”
  • 💡Red Team / Hacking
    • Exploiting Active Directory
    • Hack The Box Forest
    • Hack The Box Academy
    • Hack the Box Laboratory
    • TryHackMe Attacktive Directory
    • TryHackMe Steel Mountain
    • 👽Sliver Red Team Infrastructure
    • 😎Kick Ass Red Team cheatsheet Link
  • 💾Cyberlabz Attack Range
    • Phase One "Red and Blue"
      • Phase Two "The Next Evolution"
      • Phase Three "Initial Access"
      • Phase Four "Deeper into the DMZ"
      • Phase Five "Understanding Proxy Pivot"
      • Phase Six "Metasploit Sliver Impacket Empire!!!!
  • 💉Offensive Code
    • 😜.Net Code Quick Links
    • 🐍Python
      • Python Client / Server
    • 🤓C ++
    • 🔪C #
    • 🙊AMSI Bypass
    • PowerShell
  • 😎Metasploit / MSFVENOM
    • 🤖Metasploit
      • 😎SSL Impersonate
    • 🐍MSFVENOM
  • 🧐Sliver
    • Sliver Installation
    • Sliver Payload Generation
    • Sliver Msfvenom Payloads
    • Sliver Commands
Powered by GitBook
On this page

Was this helpful?

  1. 😎Metasploit / MSFVENOM
  2. 🤖Metasploit

😎SSL Impersonate

This module request a copy of the remote SSL certificate and creates a local (self.signed) version using the information from the remote version.

Reference: https://www.rapid7.com/db/modules/auxiliary/gather/impersonate_ssl/

PreviousMetasploitNextMSFVENOM

Last updated 2 years ago

Was this helpful?