Generic Shell Variable Substitution Command Encoder - Metasploit
This page contains detailed information about how to use the encoder/cmd/generic_sh metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Module Overview
Name: Generic Shell Variable Substitution Command Encoder
Module: encoder/cmd/generic_sh
Source code: modules/encoders/cmd/generic_sh.rb
Disclosure date: -
Last modification time: 2017-07-24 06:26:21 +0000
Supported architecture(s): cmd
Supported platform(s): Unix
Target service / protocol: -
Target network port(s): -
List of CVEs: -
This encoder uses standard Bourne shell variable substitution tricks to avoid commonly restricted characters.
Module Ranking and Traits
Module Ranking:
- manual: The exploit is unstable or difficult to exploit and is basically a DoS. This ranking is also used when the module has no use unless specifically configured by the user (e.g.: exploit/windows/smb/psexec). More information about ranking can be found here.
Basic Usage
msf > use encoder/cmd/generic_sh
msf encoder(generic_sh) > show targets
... a list of targets ...
msf encoder(generic_sh) > set TARGET target-id
msf encoder(generic_sh) > show options
... show and set options ...
msf encoder(generic_sh) > exploit
Go back to menu.
Msfconsole Usage
Here is how the encoder/cmd/generic_sh module looks in the msfconsole:
msf6 > use encoder/cmd/generic_sh
msf6 encoder(cmd/generic_sh) > show info
Name: Generic Shell Variable Substitution Command Encoder
Module: encoder/cmd/generic_sh
Platform: Unix
Arch: cmd
Rank: Manual
Provided by:
hdm <[email protected]>
Description:
This encoder uses standard Bourne shell variable substitution tricks
to avoid commonly restricted characters.
Module Options
This is a complete list of options available in the encoder/cmd/generic_sh module:
msf6 encoder(cmd/generic_sh) > show options
Module options (encoder/cmd/generic_sh):
Name Current Setting Required Description
---- --------------- -------- -----------
Advanced Options
Here is a complete list of advanced options supported by the encoder/cmd/generic_sh module:
msf6 encoder(cmd/generic_sh) > show advanced
Module advanced options (encoder/cmd/generic_sh):
Name Current Setting Required Description
---- --------------- -------- -----------
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
Go back to menu.
Related Pull Requests
- #8716 Merged Pull Request: Print_Status -> Print_Good (And OCD bits 'n bobs)
- #8338 Merged Pull Request: Fix msf/core and self.class msftidy warnings
- #6655 Merged Pull Request: use MetasploitModule as a class name
- #6648 Merged Pull Request: Change metasploit class names
- #5374 Merged Pull Request: Implements msfvenom --smallest
- #3561 Merged Pull Request: Split unix cmd generic_sh encoder
- #2944 Merged Pull Request: Use the platform when encoding the payload
- #2525 Merged Pull Request: Change module boilerplate
- #1241 Merged Pull Request: Removed all $Id$ and $Revision$ occurences
Go back to menu.
See Also
Check also the following modules related to this module:
- encoder/cmd/brace
- encoder/cmd/echo
- encoder/cmd/ifs
- encoder/cmd/perl
- encoder/cmd/powershell_base64
- encoder/cmd/printf_php_mq
- encoder/generic/eicar
- encoder/generic/none
- exploit/unix/webapp/generic_exec
- exploit/windows/http/generic_http_dll_injection
- exploit/windows/smb/generic_smb_dll_injection
- nop/cmd/generic
- nop/php/generic
- nop/tty/generic
- payload/cmd/mainframe/generic_jcl
- payload/cmd/unix/generic
- payload/cmd/windows/generic
- payload/cmd/windows/powershell/generic/debug_trap
- payload/cmd/windows/powershell/generic/tight_loop
- payload/generic/custom
- payload/generic/debug_trap
- payload/generic/shell_bind_tcp
- payload/generic/shell_reverse_tcp
- payload/generic/ssh/interact
- payload/generic/tight_loop
Authors
hdm
Version
This page has been produced using Metasploit Framework version 6.2.1-dev. For more modules, visit the Metasploit Module Library.
Go back to menu.