module
F5 Big-IP Gather Information from MCP Datastore
Disclosed | Created |
---|---|
11/16/2022 | 12/13/2022 |
Disclosed
11/16/2022
Created
12/13/2022
Description
This module gathers various interesting pieces of data from F5's
"mcp" datastore, which is accessed via /var/run/mcp using a
proprietary protocol.
Adapted from: https://github.com/rbowes-r7/refreshing-mcp-tool/blob/main/mcp-getloot.rb
"mcp" datastore, which is accessed via /var/run/mcp using a
proprietary protocol.
Adapted from: https://github.com/rbowes-r7/refreshing-mcp-tool/blob/main/mcp-getloot.rb
Author
Ron Bowes
Platform
Linux,Unix
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use post/linux/gather/f5_loot_mcp msf /(p) > show actions ...actions... msf /(p) > set ACTION < action-name > msf /(p) > show options ...show and set options... msf /(p) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.