module
HTTP Fetch, Linux Command Shell, Bind TCP Random Port Inline
| Disclosed |
|---|
| N/A |
Disclosed
N/A
Description
Fetch and execute a x86 payload from an HTTP server.
Listen for a connection in a random port and spawn a command shell.
Use nmap to discover the open port: 'nmap -sS target -p-'.
Listen for a connection in a random port and spawn a command shell.
Use nmap to discover the open port: 'nmap -sS target -p-'.
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.