Subscribe via feed.

Arista Restricted Shell Escape / Privilege Escalation

Posted by deepcore on June 17, 2020 – 7:23 pm

This Metasploit module takes advantage of a poorly configured TACACS+ config, Arista’s bash shell, and a TACACS+ read-only account to achieve privilege escalation.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.