New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
added module for cve-2012-3001 #1557
Conversation
@jvazquez-r7 to get the bash payload more stable and only run once. How about getting the exploit to drop a shell script to the system, then run that for the bash payload? then when the user quits out it automatically removes that file in the clean up just an idea for you to contemplate and to maybe make it more stable? |
Hi @L1ghtn1ng, Im glad to listen there is interest!! Still better I think, I'm going to work in a new target to execute linux payloads :) so staging from CMD to meterpreter or shell payloads will be possible :) Please in case someone looks into it, dont merge atm, lemme add a new target and make linux payloads available to the user :) Thanks! juan |
On 07/03/13 14:53, Juan Vazquez wrote:
|
I've added a new linux native target, and set it as default target. My only concern is I cannot specify the compatible cmd payloads in the targets section. The console doesn't have into account and the user can select any available cmd payload.
|
Hey @jvazquez-r7 just wondering would implementing the features of this PR #1275 in to this module help? Thought it might be a good idea for you to take a look at ? |
Tested successfully with Mutiny 4.2-1.05 as distributed on the vendor page:
http://www.mutiny.com/support/downloads/Mutiny-Build-CD-4.2-1.05.iso
Notes:
Test results: