This module allows remote command execution on the PHP IRC bot Ra1NX by using the public call feature in private message to covertly bypass the authentication system.
Module Name
exploit/multi/misc/ra1nx_pubcall_exec
Authors
- bwall
References
Targets
- Ra1NX / Unix
- Ra1NX / Windows
Platforms
- unix
- windows
Architectures
- cmd
Reliability
Development
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/multi/misc/ra1nx_pubcall_exec
msf exploit(ra1nx_pubcall_exec) > show targets
...targets...
msf exploit(ra1nx_pubcall_exec) > set TARGET
msf exploit(ra1nx_pubcall_exec) > show options
...show and set options...
msf exploit(ra1nx_pubcall_exec) > exploit
https://www.rapid7.com/db/modules/exploit/multi/misc/ra1nx_pubcall_exec
No comments:
Post a Comment