Linux Reboot - Metasploit
This page contains detailed information about how to use the payload/linux/mipsle/reboot metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Module Overview
Name: Linux Reboot
Module: payload/linux/mipsle/reboot
Source code: modules/payloads/singles/linux/mipsle/reboot.rb
Disclosure date: -
Last modification time: 2017-07-24 06:26:21 +0000
Supported architecture(s): mipsle
Supported platform(s): Linux
Target service / protocol: -
Target network port(s): -
List of CVEs: -
A very small shellcode for rebooting the system. This payload is sometimes helpful for testing purposes.
Module Ranking and Traits
Module Ranking:
- normal: The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect. More information about ranking can be found here.
Basic Usage
msf > use payload/linux/mipsle/reboot
msf payload(reboot) > show options
... show and set options ...
msf payload(reboot) > generate
To learn how to generate payload/linux/mipsle/reboot with msfvenom, please read this.
Go back to menu.
Msfconsole Usage
Here is how the linux/mipsle/reboot payload looks in the msfconsole:
msf6 > use payload/linux/mipsle/reboot
msf6 payload(linux/mipsle/reboot) > show info
Name: Linux Reboot
Module: payload/linux/mipsle/reboot
Platform: Linux
Arch: mipsle
Needs Admin: No
Total size: 32
Rank: Normal
Provided by:
Michael Messner <[email protected]>
rigan - <[email protected]>
Description:
A very small shellcode for rebooting the system. This payload is
sometimes helpful for testing purposes.
Module Options
This is a complete list of options available in the linux/mipsle/reboot payload:
msf6 payload(linux/mipsle/reboot) > show options
Module options (payload/linux/mipsle/reboot):
Name Current Setting Required Description
---- --------------- -------- -----------
Advanced Options
Here is a complete list of advanced options supported by the linux/mipsle/reboot payload:
msf6 payload(linux/mipsle/reboot) > show advanced
Module advanced options (payload/linux/mipsle/reboot):
Name Current Setting Required Description
---- --------------- -------- -----------
AppendExit false no Append a stub that executes the exit(0) system call
MeterpreterDebugLevel 0 yes Set debug level for meterpreter 0-3 (Default output is strerr)
PrependChrootBreak false no Prepend a stub that will break out of a chroot (includes setreuid to root)
PrependFork false no Prepend a stub that starts the payload in its own process via fork
PrependSetgid false no Prepend a stub that executes the setgid(0) system call
PrependSetregid false no Prepend a stub that executes the setregid(0, 0) system call
PrependSetresgid false no Prepend a stub that executes the setresgid(0, 0, 0) system call
PrependSetresuid false no Prepend a stub that executes the setresuid(0, 0, 0) system call
PrependSetreuid false no Prepend a stub that executes the setreuid(0, 0) system call
PrependSetuid false no Prepend a stub that executes the setuid(0) system call
RemoteMeterpreterDebugFile no Redirect Debug Info to a Log File
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
Go back to menu.
Related Pull Requests
- #8716 Merged Pull Request: Print_Status -> Print_Good (And OCD bits 'n bobs)
- #8338 Merged Pull Request: Fix msf/core and self.class msftidy warnings
- #6655 Merged Pull Request: use MetasploitModule as a class name
- #4894 Merged Pull Request: Implement payload size caching, speeding up framework loads
- #3142 Merged Pull Request: Fix references and whitespace in MIPS payloads.
- #3084 Merged Pull Request: msftidy fixes to m-1-k-3's mipsle reboot shellcode
- #3041 Merged Pull Request: mipsel reboot payload
References
See Also
Check also the following modules related to this module:
- payload/linux/mipsle/exec
- payload/linux/mipsle/meterpreter_reverse_http
- payload/linux/mipsle/meterpreter_reverse_https
- payload/linux/mipsle/meterpreter/reverse_tcp
- payload/linux/mipsle/meterpreter_reverse_tcp
- payload/linux/mipsle/shell_bind_tcp
- payload/linux/mipsle/shell/reverse_tcp
- payload/linux/mipsle/shell_reverse_tcp
Authors
- Michael Messner <devnull[at]s3cur1ty.de>
- rigan - <imrigan[at]gmail.com>
Version
This page has been produced using Metasploit Framework version 6.1.24-dev. For more modules, visit the Metasploit Module Library.
Go back to menu.