Lucene search

K

Unix Command Shell, Bind TCP (stub)

๐Ÿ—“๏ธย 28 Dec 2017ย 22:37:21Reported byย hdm <[email protected]>Typeย 
metasploit
ย metasploit
๐Ÿ”—ย www.rapid7.com๐Ÿ‘ย 27ย Views

Unix Command Shell, Bind TCP (stub) module for Metasploit framework. Listen for a connection and spawn a command shell without payload

Show more
Code
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##


module MetasploitModule

  CachedSize = 0

  include Msf::Payload::Single
  include Msf::Sessions::CommandShellOptions

  def initialize(info = {})
    super(merge_info(info,
      'Name'          => 'Unix Command Shell, Bind TCP (stub)',
      'Description'   => 'Listen for a connection and spawn a command shell (stub only, no payload)',
      'Author'        => 'hdm',
      'License'       => MSF_LICENSE,
      'Platform'      => 'unix',
      'Arch'          => ARCH_CMD,
      'Handler'       => Msf::Handler::BindTcp,
      'Session'       => Msf::Sessions::CommandShell,
      'PayloadType'   => 'cmd_bind_stub',
      'RequiredCmd'   => '',
      'Payload'       =>
        {
          'Offsets' => { },
          'Payload' => ''
        }
      ))
  end

  #
  # Generate an empty payload
  #
  def generate(_opts = {})
    ''
  end
end

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
28 Dec 2017 22:21Current
7.5High risk
Vulners AI Score7.5
27
.json
Report