Linux Execute Command - Metasploit
This page contains detailed information about how to use the payload/linux/mipsbe/exec metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Module Overview
Name: Linux Execute Command
Module: payload/linux/mipsbe/exec
Source code: modules/payloads/singles/linux/mipsbe/exec.rb
Disclosure date: -
Last modification time: 2017-07-24 06:26:21 +0000
Supported architecture(s): mipsbe
Supported platform(s): Linux
Target service / protocol: -
Target network port(s): -
List of CVEs: -
A very small shellcode for executing commands. This module is sometimes helpful for testing purposes.
Module Ranking and Traits
Module Ranking:
- normal: The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect. More information about ranking can be found here.
Basic Usage
msf > use payload/linux/mipsbe/exec
msf payload(exec) > show options
... show and set options ...
msf payload(exec) > generate
To learn how to generate payload/linux/mipsbe/exec with msfvenom, please read this.
Required Options
- CMD: The command string to execute
Go back to menu.
Msfconsole Usage
Here is how the linux/mipsbe/exec payload looks in the msfconsole:
msf6 > use payload/linux/mipsbe/exec
msf6 payload(linux/mipsbe/exec) > show info
Name: Linux Execute Command
Module: payload/linux/mipsbe/exec
Platform: Linux
Arch: mipsbe
Needs Admin: No
Total size: 48
Rank: Normal
Provided by:
Michael Messner <[email protected]>
entropy <[email protected]>
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
CMD yes The command string to execute
Description:
A very small shellcode for executing commands. This module is
sometimes helpful for testing purposes.
Module Options
This is a complete list of options available in the linux/mipsbe/exec payload:
msf6 payload(linux/mipsbe/exec) > show options
Module options (payload/linux/mipsbe/exec):
Name Current Setting Required Description
---- --------------- -------- -----------
CMD yes The command string to execute
Advanced Options
Here is a complete list of advanced options supported by the linux/mipsbe/exec payload:
msf6 payload(linux/mipsbe/exec) > show advanced
Module advanced options (payload/linux/mipsbe/exec):
Name Current Setting Required Description
---- --------------- -------- -----------
AppendExit false no Append a stub that executes the exit(0) system call
MeterpreterDebugLevel 0 yes Set debug level for meterpreter 0-3 (Default output is strerr)
PrependChrootBreak false no Prepend a stub that will break out of a chroot (includes setreuid to root)
PrependFork false no Prepend a stub that starts the payload in its own process via fork
PrependSetgid false no Prepend a stub that executes the setgid(0) system call
PrependSetregid false no Prepend a stub that executes the setregid(0, 0) system call
PrependSetresgid false no Prepend a stub that executes the setresgid(0, 0, 0) system call
PrependSetresuid false no Prepend a stub that executes the setresuid(0, 0, 0) system call
PrependSetreuid false no Prepend a stub that executes the setreuid(0, 0) system call
PrependSetuid false no Prepend a stub that executes the setuid(0) system call
RemoteMeterpreterDebugFile no Redirect Debug Info to a Log File
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
Go back to menu.
Related Pull Requests
- #8716 Merged Pull Request: Print_Status -> Print_Good (And OCD bits 'n bobs)
- #8338 Merged Pull Request: Fix msf/core and self.class msftidy warnings
- #6655 Merged Pull Request: use MetasploitModule as a class name
- #5838 Merged Pull Request: Instantiate payload modules so parameter validation occurs
- #4894 Merged Pull Request: Implement payload size caching, speeding up framework loads
- #3320 Merged Pull Request: MIPS exec payload fixes for encoder
- #3147 Merged Pull Request: exec payload - new try
References
- CVE: Not available
- EDB-17940
See Also
Check also the following modules related to this module:
- payload/linux/mipsbe/meterpreter_reverse_http
- payload/linux/mipsbe/meterpreter_reverse_https
- payload/linux/mipsbe/meterpreter/reverse_tcp
- payload/linux/mipsbe/meterpreter_reverse_tcp
- payload/linux/mipsbe/reboot
- payload/linux/mipsbe/shell_bind_tcp
- payload/linux/mipsbe/shell/reverse_tcp
- payload/linux/mipsbe/shell_reverse_tcp
Authors
- Michael Messner <devnull[at]s3cur1ty.de>
- [email protected]
Version
This page has been produced using Metasploit Framework version 6.1.24-dev. For more modules, visit the Metasploit Module Library.
Go back to menu.