diff --git a/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md b/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md index bad25a6bd2..e2f94508eb 100644 --- a/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md +++ b/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md @@ -17,10 +17,10 @@ 1. Start `msfconsole` 2. Get a session - 3. `use exploit/linux/local/rds_priv_esc` - 4. `set SESSION [SESSION]` - 5. `check` - 6. `run` + 3. Do: ```use exploit/linux/local/rds_rds_page_copy_user_priv_esc``` + 4. Do: ```set SESSION [SESSION]``` + 5. Do: ```check``` + 6. Do: ```run``` 7. You should get a new *root* session diff --git a/modules/exploits/linux/local/rds_rds_page_copy_user_priv_esc.rb b/modules/exploits/linux/local/rds_rds_page_copy_user_priv_esc.rb index 04e540d34d..373496198e 100644 --- a/modules/exploits/linux/local/rds_rds_page_copy_user_priv_esc.rb +++ b/modules/exploits/linux/local/rds_rds_page_copy_user_priv_esc.rb @@ -61,7 +61,10 @@ class MetasploitModule < Msf::Exploit::Local }, 'Notes' => { - 'AKA' => ['rds-fail.c'] + 'AKA' => ['rds-fail.c'], + 'Reliability' => [ UNRELIABLE_SESSION ], + 'Stability' => [ CRASH_SAFE ], + 'SideEffects' => [ ARTIFACTS_ON_DISK ] }, 'DefaultTarget' => 0)) register_advanced_options [