This Metasploit module takes advantage of a poorly configured TACACS+ config, Arista's bash shell, and a TACACS+ read-only account to achieve privilege escalation.
86fccaf72b7727767295df0286ab1d606f02b1e49f7979bfafc39f16ae633df4
© 2022 Packet Storm. All rights reserved.