module

Reptile Rootkit reptile_cmd Privilege Escalation

Disclosed
2018-10-29
Created
2019-12-22

Description

This module uses Reptile rootkit's `reptile_cmd` backdoor executable
to gain root privileges using the `root` command.

This module has been tested successfully with Reptile from `master`
branch (2019-03-04) on Ubuntu 18.04.3 (x64) and Linux Mint 19 (x64).

Authors

f0rb1dd3n
bcoles bcoles@gmail.com

Platform

Linux

Architectures

x86, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/local/reptile_rootkit_reptile_cmd_priv_esc
msf exploit(reptile_rootkit_reptile_cmd_priv_esc) > show targets
...targets...
msf exploit(reptile_rootkit_reptile_cmd_priv_esc) > set TARGET < target-id >
msf exploit(reptile_rootkit_reptile_cmd_priv_esc) > show options
...show and set options...
msf exploit(reptile_rootkit_reptile_cmd_priv_esc) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.