module

PHP Command Shell, Find Sock

Disclosed
N/A
Created
2018-05-30

Description

Spawn a shell on the established connection to
the webserver. Unfortunately, this payload
can leave conspicuous evil-looking entries in the
apache error logs, so it is probably a good idea
to use a bind or reverse shell unless firewalls
prevent them from working. The issue this
payload takes advantage of (CLOEXEC flag not set
on sockets) appears to have been patched on the
Ubuntu version of Apache and may not work on
other Debian-based distributions. Only tested on
Apache but it might work on other web servers
that leak file descriptors to child processes.

Author

egypt egypt@metasploit.com

Platform

PHP

Architectures

php

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use payload/php/shell_findsock
msf payload(shell_findsock) > show actions
...actions...
msf payload(shell_findsock) > set ACTION < action-name >
msf payload(shell_findsock) > show options
...show and set options...
msf payload(shell_findsock) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.