You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/exploit/multi/misc/bmc_server_automation_rscd_nsh_rce.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,8 +19,8 @@ To use this exploit you will need access to BMC BladeLogic Server Automation.
19
19
4. Load the module `use exploit/multi/misc/bmc_server_automation_rscd_nsh_rce`.
20
20
5. Select the generic command target `set target 3`.
21
21
6. Select a generic command payload `set payload cmd/unix/generic` or `set payload cmd/windows/generic`.
22
-
6. Set the command to execute `set CMD "echo MSF"` or `set CMD "cmd /c echo MSF"`.
23
-
7. Run the exploit `exploit`.
22
+
7. Set the command to execute `set CMD "echo MSF"` or `set CMD "cmd /c echo MSF"`.
23
+
8. Run the exploit `exploit`.
24
24
25
25
The result should be that the string `MSF` is returned and output.
26
26
@@ -63,7 +63,7 @@ This module target provides support for command staging to enable arbitrary Meta
63
63
[*] Meterpreter session 1 opened (172.31.58.107:4444 -> 34.239.181.84:56233) at 2018-01-14 00:54:49 +0000
64
64
65
65
### Target 2: Unix/Linux
66
-
This module target provides support for command staging to enable arbitrary Metasploit payloads to be used against Unix/Linux targets in the same was as target 1.
66
+
This module target provides support for command staging to enable arbitrary Metasploit payloads to be used against Unix/Linux targets in the same way as target 1.
67
67
68
68
### Target 3: Generic Cmd
69
69
This target can be used with *cmd* payloads to execute operating system commands against the target host.
0 commit comments