background image

Metasploit Auxiliary Modules

131

into existing functions of the Framework. This is a great example of the 
power of the Framework, because it allows us to concentrate only on the 
information needed to address our goal. There is no reason to reproduce 
any of the standard functions such as error handling, connection manage-
ment, and so on.

Let’s see this module in action. If you don’t remember the full path to 

the module within the Metasploit directory structure, search for it like so.

 msf > 

search foursquare

[*] Searching loaded modules for pattern 'foursquare'...

Auxiliary
=========

   Name              Rank    Description
   ----              ----    -----------
   admin/foursquare  normal  Foursquare Location Poster

msf > use admin/foursquare
msf auxiliary(foursquare) > info

       Name: Foursquare Location Poster
    Version: $Revision:$
    License: Metasploit Framework License (BSD)
       Rank: Normal

Provided by:
  CG <cg@carnal0wnage.com>

Basic options:
  Name      Current Setting     Required  Description
  ----      ---------------     --------  -----------
  PASSWORD  password            yes       foursquare password
  Proxies                       no        Use a proxy chain
  RHOST     api.foursquare.com  yes       The target address
  RPORT     80                  yes       The target port
  USERNAME  username            yes       foursquare username
  VENUEID   185675              yes       foursquare venueid
  VHOST                         no        HTTP server virtual host

Description:
  F*ck with Foursquare, be anywhere you want to be by venue id

References:
  http://groups.google.com/group/foursquare-api
  http://www.mikekey.com/im-a-foursquare-cheater/