module

HTTP Fetch, Linux Execute Command

Disclosed
N/A
Created
Feb 20, 2025

Description

Fetch and execute an MIPSLE payload from an HTTP server.

A very small shellcode for executing commands.
This module is sometimes helpful for testing purposes as well as
on targets with extremely limited buffer space.

Authors

Brendan Watters
Spencer McIntyre
Michael Messner devnull@s3cur1ty.de
entropy entropy@phiral.net

Platform

Linux

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use payload/cmd/linux/http/mipsle/exec
msf payload(exec) > show actions
...actions...
msf payload(exec) > set ACTION < action-name >
msf payload(exec) > show options
...show and set options...
msf payload(exec) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.