Skip to content

Commit 18fa897

Browse files
committed
Add initial at_persistence documentation
1 parent 79a8123 commit 18fa897

File tree

1 file changed

+32
-0
lines changed

1 file changed

+32
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
## Vulnerable Application
2+
3+
This module executes a metasploit payload utilizing `at(1)` to execute jobs at a specific time. It should work out of the box
4+
with any UNIX-like operating system with `atd` running. In the case of OS X, the `atrun` service must be launched:
5+
6+
```
7+
sudo launchctl load -w /System/Library/LaunchDaemons/com.apple.atrun.plist
8+
```
9+
10+
## Verification Steps
11+
12+
1. Start msfconsole
13+
2. Exploit a box via whatever method
14+
3. Do: `use exploit/multi/local/at_persistence`
15+
4. Do: `set session #`
16+
5. Do: `set target #`
17+
6. `exploit`
18+
19+
20+
## Options
21+
22+
**TIMING**
23+
24+
Controls the time value passed to `at(1)`
25+
26+
**PATH**
27+
28+
If set, uses this value as the path on the remote system to store the payload. If unset, uses `mktemp`.
29+
30+
## Scenarios
31+
32+
TBD

0 commit comments

Comments
 (0)