Alternatively, running the other kernel exploits suggested bylocal_exploit_ suggesterwill fail. This is an important lesson to learn: you cannot always rely on using automated Metasploit modules to gain access or elevate your privileges on the target system. Trial and error is a big part of the...
it's less time-consuming to find another route than it is to debug someone else's exploit code. In cases where the code is so bad it might require a near re-write in order to function in your environment, I would recommend taking some time and porting it into Metasploit. If you're ...
Penetration Testing - A Hands-On Introduction to Hacking by Georgia Weidman The Basics of Hacking and Penetration Testing by Patrick Engebretson Advanced Penetration Testing by Wil Allsopp Metasploit: The Penetration Tester's Guide by David Kennedy ...