module

HashiCorp Nomad Remote Command Execution

Disclosed
May 17, 2021
Created
Jun 15, 2021

Description

Create a batch job on HashiCorp's Nomad service to spawn a shell. The default option
is to use the 'raw_exec' driver, which runs with high privileges. Development servers
and client's explicitly enabling the 'raw_exec' plugin can spawn these type of jobs.
Regular 'exec' jobs can be created in a similar fashion at a lower privilege level.

Author

Wyatt Dahlenburg ( Wyatt Dahlenburg (@wdahlenb)

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/misc/nomad_exec
msf exploit(nomad_exec) > show targets
...targets...
msf exploit(nomad_exec) > set TARGET < target-id >
msf exploit(nomad_exec) > show options
...show and set options...
msf exploit(nomad_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.