Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/unix/local/at_persistence.md
Views: 11789
Vulnerable Application
This module executes a metasploit payload utilizing at(1)
to execute jobs at a specific time. It should work out of the box with any UNIX-like operating system with atd
running. In the case of OS X, the atrun
service must be launched:
Verification Steps
Start msfconsole
Exploit a box via whatever method
Do:
use exploit/unix/local/at_persistence
Do:
set session #
Do:
set target #
exploit
Options
TIME
When to run job via at(1). Changing may require WfsDelay to be adjusted.
PATH
Path to store payload to be executed by at(1). Leave unset to use mktemp.
Scenarios
This module is useful for running one-shot payloads with delayed execution. It is slightly less obvious than cron.