module

Login to Another User with Su on Linux / Unix Systems

Disclosed
1971-11-03
Created
2020-10-20

Description

This module attempts to create a new login session by
invoking the su command of a valid username and password.

If the login is successful, a new session is created via
the specified payload.

Because su forces passwords to be passed over stdin, this
module attempts to invoke a psuedo-terminal with python,
python3, or script.

Author

Gavin Youker youkergav@gmail.com

Platform

Linux,Unix

Architectures

x86, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/local/su_login
msf exploit(su_login) > show targets
...targets...
msf exploit(su_login) > set TARGET < target-id >
msf exploit(su_login) > show options
...show and set options...
msf exploit(su_login) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.