diff --git a/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md b/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md index e2f94508eb..16ecc91c00 100644 --- a/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md +++ b/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md @@ -90,3 +90,13 @@ The executables were cross-compiled with [musl-cross](https://s3.amazonaws.com/m meterpreter > ``` +## Re-exploitation + +The exploit C code utilizes a defined send (`5555`) and receive (`6666`) port, which are opened while the payload is active. +Attempt to re-exploit while a successful exploit payload is open will result in the error: + +``` +[*] Could not bind socket. +``` + +However, killing that payload will allow for the exploit to run successfully.