From d5bd2bf24e88e2fbc24f659b855a62cc8b887cd7 Mon Sep 17 00:00:00 2001 From: Brendan Coles Date: Sat, 4 Jan 2020 18:24:55 +0000 Subject: [PATCH] Land #12788, Add rds_rds_page_copy_user_priv_esc re-exploitation notes --- .../linux/local/rds_rds_page_copy_user_priv_esc.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md b/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md index e2f94508eb..16ecc91c00 100644 --- a/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md +++ b/documentation/modules/exploit/linux/local/rds_rds_page_copy_user_priv_esc.md @@ -90,3 +90,13 @@ The executables were cross-compiled with [musl-cross](https://s3.amazonaws.com/m meterpreter > ``` +## Re-exploitation + +The exploit C code utilizes a defined send (`5555`) and receive (`6666`) port, which are opened while the payload is active. +Attempt to re-exploit while a successful exploit payload is open will result in the error: + +``` +[*] Could not bind socket. +``` + +However, killing that payload will allow for the exploit to run successfully.