Linux Command Shell, Bind TCP Random Port Inline - Metasploit
This page contains detailed information about how to use the payload/linux/x64/shell_bind_tcp_random_port metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Module Overview
Name: Linux Command Shell, Bind TCP Random Port Inline
Module: payload/linux/x64/shell_bind_tcp_random_port
Source code: modules/payloads/singles/linux/x64/shell_bind_tcp_random_port.rb
Disclosure date: -
Last modification time: 2021-04-03 12:04:32 +0000
Supported architecture(s): x64
Supported platform(s): Linux
Target service / protocol: -
Target network port(s): -
List of CVEs: -
Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
Module Ranking and Traits
Module Ranking:
- normal: The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect. More information about ranking can be found here.
Basic Usage
msf > use payload/linux/x64/shell_bind_tcp_random_port
msf payload(shell_bind_tcp_random_port) > show options
... show and set options ...
msf payload(shell_bind_tcp_random_port) > generate
To learn how to generate payload/linux/x64/shell_bind_tcp_random_port with msfvenom, please read this.
Go back to menu.
Msfconsole Usage
Here is how the linux/x64/shell_bind_tcp_random_port payload looks in the msfconsole:
msf6 > use payload/linux/x64/shell_bind_tcp_random_port
msf6 payload(linux/x64/shell_bind_tcp_random_port) > show info
Name: Linux Command Shell, Bind TCP Random Port Inline
Module: payload/linux/x64/shell_bind_tcp_random_port
Platform: Linux
Arch: x64
Needs Admin: No
Total size: 51
Rank: Normal
Provided by:
Geyslan G. Bem <[email protected]>
Description:
Listen for a connection in a random port and spawn a command shell.
Use nmap to discover the open port: 'nmap -sS target -p-'.
Module Options
This is a complete list of options available in the linux/x64/shell_bind_tcp_random_port payload:
msf6 payload(linux/x64/shell_bind_tcp_random_port) > show options
Module options (payload/linux/x64/shell_bind_tcp_random_port):
Name Current Setting Required Description
---- --------------- -------- -----------
Advanced Options
Here is a complete list of advanced options supported by the linux/x64/shell_bind_tcp_random_port payload:
msf6 payload(linux/x64/shell_bind_tcp_random_port) > show advanced
Module advanced options (payload/linux/x64/shell_bind_tcp_random_port):
Name Current Setting Required Description
---- --------------- -------- -----------
AppendExit false no Append a stub that executes the exit(0) system call
MeterpreterDebugLevel 0 yes Set debug level for meterpreter 0-3 (Default output is strerr)
PrependChrootBreak false no Prepend a stub that will break out of a chroot (includes setreuid to root)
PrependFork false no Prepend a stub that starts the payload in its own process via fork
PrependSetgid false no Prepend a stub that executes the setgid(0) system call
PrependSetregid false no Prepend a stub that executes the setregid(0, 0) system call
PrependSetresgid false no Prepend a stub that executes the setresgid(0, 0, 0) system call
PrependSetresuid false no Prepend a stub that executes the setresuid(0, 0, 0) system call
PrependSetreuid false no Prepend a stub that executes the setreuid(0, 0) system call
PrependSetuid false no Prepend a stub that executes the setuid(0) system call
RemoteMeterpreterDebugFile no Redirect Debug Info to a Log File
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
Go back to menu.
Related Pull Requests
- #14997 Merged Pull Request: x64/shell_bind_tcp_random_port: rip one byte off
- #14685 Merged Pull Request: payload/x64: shell_bind_tcp_random_port improvement
- #14621 Merged Pull Request: Refactor (reduce) linux/x64/shell_bind_tcp_random_port
- #9960 Merged Pull Request: fix continuation warnings in payloads
- #8716 Merged Pull Request: Print_Status -> Print_Good (And OCD bits 'n bobs)
- #8338 Merged Pull Request: Fix msf/core and self.class msftidy warnings
- #7507 Merged Pull Request: Refactor arch/platform, refactor TLV XOR, add UUID to each packet, fix payload uuid/arch/platform tracking, and update everything to match
- #6655 Merged Pull Request: use MetasploitModule as a class name
- #4918 Merged Pull Request: Reworks how payload prepends work internally, see #1674
- #4894 Merged Pull Request: Implement payload size caching, speeding up framework loads
- #2662 Merged Pull Request: Resplat shell_bind_tcp_random_port
- #2350 Merged Pull Request: New Payload (shell_bind_tcp_random_port)
Go back to menu.
See Also
Check also the following modules related to this module:
- payload/linux/x64/exec
- payload/linux/x64/meterpreter/bind_tcp
- payload/linux/x64/meterpreter_reverse_http
- payload/linux/x64/meterpreter_reverse_https
- payload/linux/x64/meterpreter/reverse_tcp
- payload/linux/x64/meterpreter_reverse_tcp
- payload/linux/x64/pingback_bind_tcp
- payload/linux/x64/pingback_reverse_tcp
- payload/linux/x64/shell_bind_ipv6_tcp
- payload/linux/x64/shell/bind_tcp
- payload/linux/x64/shell_bind_tcp
- payload/linux/x64/shell_find_port
- payload/linux/x64/shell_reverse_ipv6_tcp
- payload/linux/x64/shell/reverse_tcp
- payload/linux/x64/shell_reverse_tcp
Authors
Geyslan G. Bem <geyslan[at]gmail.com>
Version
This page has been produced using Metasploit Framework version 6.1.24-dev. For more modules, visit the Metasploit Module Library.
Go back to menu.