Skip to content

Commit 59f3c9e

Browse files
author
Brent Cook
committed
Land rapid7#7579, rename netfilter_priv_esc to rename netfilter_priv_esc_ipv4
2 parents 6f8660f + 0182594 commit 59f3c9e

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

documentation/modules/exploit/linux/local/netfilter_priv_esc.md renamed to documentation/modules/exploit/linux/local/netfilter_priv_esc_ipv4.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This does not work against the following vulnerable systems. Additional work ma
2727

2828
1. Start msfconsole
2929
2. Exploit a box via whatever method
30-
4. Do: `use exploit/linux/local/netfilter_priv_esc`
30+
4. Do: `use exploit/linux/local/netfilter_priv_esc_ipv4`
3131
5. Do: `set session #`
3232
6. Do: `set verbose true`
3333
7. Do: `exploit`
@@ -115,7 +115,7 @@ This does not work against the following vulnerable systems. Additional work ma
115115

116116
#### Escalate w/ pre-compiled binaries
117117

118-
msf exploit(netfilter_priv_esc) > exploit
118+
msf exploit(netfilter_priv_esc_ipv4) > exploit
119119

120120
[*] Started reverse TCP handler on 192.168.2.117:4444
121121
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed
@@ -160,9 +160,9 @@ This does not work against the following vulnerable systems. Additional work ma
160160

161161
In this scenario, we already exploit the box, for whatever reason our shell died. So now we want to re-exploit, but we dont need to run desc again.
162162

163-
msf exploit(netfilter_priv_esc) > set reexploit true
163+
msf exploit(netfilter_priv_esc_ipv4) > set reexploit true
164164
reexploit => true
165-
msf exploit(netfilter_priv_esc) > exploit
165+
msf exploit(netfilter_priv_esc_ipv4) > exploit
166166

167167
[*] Started reverse TCP handler on 192.168.2.117:4444
168168
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed
@@ -191,9 +191,9 @@ In this scenario, we already exploit the box, for whatever reason our shell died
191191

192192
#### Re-exploit w/ pre-compiled binaries
193193

194-
msf exploit(netfilter_priv_esc) > set reexploit true
194+
msf exploit(netfilter_priv_esc_ipv4) > set reexploit true
195195
reexploit => true
196-
msf exploit(netfilter_priv_esc) > exploit
196+
msf exploit(netfilter_priv_esc_ipv4) > exploit
197197

198198
[*] Started reverse TCP handler on 192.168.2.117:4444
199199
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed

0 commit comments

Comments
 (0)