Land #12788, Add rds_rds_page_copy_user_priv_esc re-exploitation notes
This commit is contained in:
committed by
Metasploit
parent
58426a730c
commit
d5bd2bf24e
@@ -90,3 +90,13 @@ The executables were cross-compiled with [musl-cross](https://s3.amazonaws.com/m
|
||||
meterpreter >
|
||||
```
|
||||
|
||||
## Re-exploitation
|
||||
|
||||
The exploit C code utilizes a defined send (`5555`) and receive (`6666`) port, which are opened while the payload is active.
|
||||
Attempt to re-exploit while a successful exploit payload is open will result in the error:
|
||||
|
||||
```
|
||||
[*] Could not bind socket.
|
||||
```
|
||||
|
||||
However, killing that payload will allow for the exploit to run successfully.
|
||||
|
||||
Reference in New Issue
Block a user