728x90
Firefox Exec Shellcode from Privileged Javascript Shell
This module allows execution of native payloads from a privileged Firefox Javascript shell. It places the specified payload into memory, adds the necessary protection flags, and calls it, which can be useful for upgrading a Firefox javascript shell to a Meterpreter session without touching the disk.
Module Name
exploit/firefox/local/exec_shellcode
Authors
- joev <joev [at] metasploit.com>
Targets
- Native Payload
Platforms
- firefox
- linux
- osx
- windows
- unix
Architectures
- x86, x86_64, mips, mipsle, mipsbe, ppc, ppc64, cbea, cbea64, sparc, armle, armbe, cmd, php, tty, java, ruby, dalvik, python, nodejs, firefox
Reliability
Development
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/firefox/local/exec_shellcode
msf exploit(exec_shellcode) > show targets
...targets...
msf exploit(exec_shellcode) > set TARGET <target-id>
msf exploit(exec_shellcode) > show options
...show and set options...
msf exploit(exec_shellcode) > exploit
728x90
'Metasploit ' 카테고리의 다른 글
Firefox Gather Cookies from Privileged Javascript Shell (0) | 2014.03.28 |
---|---|
quantum vmPRO backdoor (0) | 2014.03.27 |
Yokogawa CENTUM CS 3000 BKHOdeq.exe Buffer Overflow (0) | 2014.03.27 |
Safari User-Assisted Download and Run Attack (0) | 2014.03.27 |
MS14-012 Internet Explorer TextRange Use-After-Free (0) | 2014.03.27 |