File tree Expand file tree Collapse file tree 1 file changed +32
-0
lines changed
documentation/modules/exploit/multi/local Expand file tree Collapse file tree 1 file changed +32
-0
lines changed Original file line number Diff line number Diff line change
1
+ ## Vulnerable Application
2
+
3
+ This module executes a metasploit payload utilizing ` at(1) ` to execute jobs at a specific time. It should work out of the box
4
+ with any UNIX-like operating system with ` atd ` running. In the case of OS X, the ` atrun ` service must be launched:
5
+
6
+ ```
7
+ sudo launchctl load -w /System/Library/LaunchDaemons/com.apple.atrun.plist
8
+ ```
9
+
10
+ ## Verification Steps
11
+
12
+ 1 . Start msfconsole
13
+ 2 . Exploit a box via whatever method
14
+ 3 . Do: ` use exploit/multi/local/at_persistence `
15
+ 4 . Do: ` set session # `
16
+ 5 . Do: ` set target # `
17
+ 6 . ` exploit `
18
+
19
+
20
+ ## Options
21
+
22
+ ** TIMING**
23
+
24
+ Controls the time value passed to ` at(1) `
25
+
26
+ ** PATH**
27
+
28
+ If set, uses this value as the path on the remote system to store the payload. If unset, uses ` mktemp ` .
29
+
30
+ ## Scenarios
31
+
32
+ TBD
You can’t perform that action at this time.
0 commit comments