Skip to content

Commit dbc7867

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent c901b5a commit dbc7867

File tree

1 file changed

+54
-43
lines changed

1 file changed

+54
-43
lines changed

db/modules_metadata_base.json

Lines changed: 54 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -125263,6 +125263,60 @@
125263125263
"session_types": false,
125264125264
"needs_cleanup": null
125265125265
},
125266+
"exploit_multi/persistence/at": {
125267+
"name": "at(1) Persistence",
125268+
"fullname": "exploit/multi/persistence/at",
125269+
"aliases": [
125270+
"exploits/unix/local/at_persistence"
125271+
],
125272+
"rank": 600,
125273+
"disclosure_date": "1997-01-01",
125274+
"type": "exploit",
125275+
"author": [
125276+
"Jon Hart <[email protected]>"
125277+
],
125278+
"description": "This module executes a metasploit payload utilizing at(1) to execute jobs at a specific time. It should work out of the box\n with any UNIX-like operating system with atd running.\n Verified on Kali linux and OSX 13.7.4",
125279+
"references": [
125280+
"URL-https://linux.die.net/man/1/at",
125281+
"URL-https://www.geeksforgeeks.org/at-command-in-linux-with-examples/",
125282+
"ATT&CK-T1053.002",
125283+
"ATT&CK-T1053.001"
125284+
],
125285+
"platform": "Linux,OSX,Unix",
125286+
"arch": "cmd, x86, x64, armle, aarch64, ppc, mipsle, mipsbe",
125287+
"rport": null,
125288+
"autofilter_ports": [],
125289+
"autofilter_services": [],
125290+
"targets": [
125291+
"Automatic"
125292+
],
125293+
"mod_time": "2025-09-06 15:12:16 +0000",
125294+
"path": "/modules/exploits/multi/persistence/at.rb",
125295+
"is_install_path": true,
125296+
"ref_name": "multi/persistence/at",
125297+
"check": true,
125298+
"post_auth": false,
125299+
"default_credential": false,
125300+
"notes": {
125301+
"Reliability": [
125302+
"repeatable-session",
125303+
"event-dependent"
125304+
],
125305+
"Stability": [
125306+
"crash-safe"
125307+
],
125308+
"SideEffects": [
125309+
"artifacts-on-disk",
125310+
"config-changes"
125311+
]
125312+
},
125313+
"session_types": [
125314+
"meterpreter",
125315+
"shell"
125316+
],
125317+
"needs_cleanup": true,
125318+
"actions": []
125319+
},
125266125320
"exploit_multi/php/ignition_laravel_debug_rce": {
125267125321
"name": "Unauthenticated remote code execution in Ignition",
125268125322
"fullname": "exploit/multi/php/ignition_laravel_debug_rce",
@@ -131841,49 +131895,6 @@
131841131895
"session_types": false,
131842131896
"needs_cleanup": null
131843131897
},
131844-
"exploit_unix/local/at_persistence": {
131845-
"name": "at(1) Persistence",
131846-
"fullname": "exploit/unix/local/at_persistence",
131847-
"aliases": [],
131848-
"rank": 600,
131849-
"disclosure_date": "1997-01-01",
131850-
"type": "exploit",
131851-
"author": [
131852-
"Jon Hart <[email protected]>"
131853-
],
131854-
"description": "This module achieves persistence by executing payloads via at(1).",
131855-
"references": [],
131856-
"platform": "Unix",
131857-
"arch": "cmd",
131858-
"rport": null,
131859-
"autofilter_ports": [],
131860-
"autofilter_services": [],
131861-
"targets": [
131862-
"Automatic"
131863-
],
131864-
"mod_time": "2023-02-05 15:45:30 +0000",
131865-
"path": "/modules/exploits/unix/local/at_persistence.rb",
131866-
"is_install_path": true,
131867-
"ref_name": "unix/local/at_persistence",
131868-
"check": true,
131869-
"post_auth": false,
131870-
"default_credential": false,
131871-
"notes": {
131872-
"Reliability": [
131873-
"repeatable-session"
131874-
],
131875-
"Stability": [
131876-
"crash-safe"
131877-
],
131878-
"SideEffects": [
131879-
"artifacts-on-disk",
131880-
"config-changes"
131881-
]
131882-
},
131883-
"session_types": [],
131884-
"needs_cleanup": true,
131885-
"actions": []
131886-
},
131887131898
"exploit_unix/local/chkrootkit": {
131888131899
"name": "Chkrootkit Local Privilege Escalation",
131889131900
"fullname": "exploit/unix/local/chkrootkit",

0 commit comments

Comments
 (0)