Skip to content

Commit

Permalink
Minor Doc Changes
Browse files Browse the repository at this point in the history
  • Loading branch information
jrobles-r7 committed Dec 19, 2018
1 parent bb758f9 commit 5bfdc70
Showing 1 changed file with 5 additions and 4 deletions.
9 changes: 5 additions & 4 deletions documentation/modules/exploit/multi/misc/erlang_cookie_rce.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
## Vulnerable Application

The [Erlang Port Mapper Daemon](https://www.erlang.org/) is used to coordinate distributed erlang
instances. Should an attacker gain access to this cookie code execution is trivial. Normally this
instances. Should an attacker get the authentication cookie code execution is trivial. Normally this
cookie can be found in the home directory as ".erlang.cookie", however it varies system to system
as well as it's configuration. As an example on a Windows 10 instance it can be found under the
users home directory: e.g "C:\Users\<USER>\.erlang.cookie". Code execution is achieved via the
"os:cmd('cmd')." command
as well as its configuration. As an example on a Windows 10 instance it can be found under the
users home directory: e.g `C:\Users\<USER>\.erlang.cookie`. Code execution is achieved via the
`os:cmd('cmd').` command

## Verification Steps

Expand Down Expand Up @@ -116,6 +116,7 @@ msf exploit(multi/misc/erlang_cookie_rce) > exploit
Once exploitation is complete the tester can authenticate. Another method that can be used is SMB as shown below.

exploit.rc ->

```
use exploit/windows/smb/smb_delivery
set SHARE MSF
Expand Down

0 comments on commit 5bfdc70

Please sign in to comment.