본문 바로가기

Metasploit

Firefox Exec Shellcode from Privileged Javascript Shell

728x90

Firefox Exec Shellcode from Privileged Javascript Shell

This module allows execution of native payloads from a privileged Firefox Javascript shell. It places the specified payload into memory, adds the necessary protection flags, and calls it, which can be useful for upgrading a Firefox javascript shell to a Meterpreter session without touching the disk.

Module Name

exploit/firefox/local/exec_shellcode

Authors

  • joev <joev [at] metasploit.com>

Targets

  • Native Payload

Platforms

  • firefox
  • linux
  • osx
  • windows
  • unix

Architectures

  • x86, x86_64, mips, mipsle, mipsbe, ppc, ppc64, cbea, cbea64, sparc, armle, armbe, cmd, php, tty, java, ruby, dalvik, python, nodejs, firefox

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/firefox/local/exec_shellcode msf exploit(exec_shellcode) > show targets ...targets... msf exploit(exec_shellcode) > set TARGET <target-id> msf exploit(exec_shellcode) > show options ...show and set options... msf exploit(exec_shellcode) > exploit


728x90