Path: blob/master/documentation/modules/exploit/linux/persistence/igel_persistence.md
27931 views
Vulnerable Application
IGEL OS with a shell or meterpreter session.
IGEL OS is a Linux-based operating system designed for endpoint devices, primarily used in enterprise environments to provide secure access to virtual workspaces. It focuses on enhancing security, simplifying management, and improving user productivity across various sectors, including healthcare and finance.
Most of the operating system is read-only, mounted from SquashFS images stored in their proprietary filesystem, with the exception of a few persistent locations. Therefore, changes to the system will likely be lost on a reboot, unless written to specific locations, such as /license or registry.
This module requires root access in order to write to privileged locations in registry and optionally remount and write to /license.
By default, the module writes a command payload to registry to fetch and execute the binary payload on establishing a network connection after a reboot.
See igelfs for more information about the IGEL filesystem and an unofficial Python implementation.
Verification Steps
Get a
shellormeterpretersession on an IGEL OS hostUse:
use exploit/linux/persistence/igel_persistenceSet:
set SESSION <id>, replacing<id>with the session IDSet payload options, e.g.
LHOSTExploit:
runThe payload is executed on next boot/login (dependent on
REGISTRY_KEY)
Options
| Name | Description |
|---|---|
| REGISTRY_KEY | Registry key to use for automatically executing payload |
| REGISTRY_ONLY | Set whether to store payload in registry (dropper only) |
| TARGET_DIR | Directory to write payload (dropper only) |