Oct. 27, 2022, 12:53 p.m. |

Packet Storm packetstormsecurity.com

This Metasploit module exploits a default Vagrant synced folder (shared folder) to append a Ruby payload to the Vagrant project Vagrantfile config file. By default, unless a Vagrant project explicitly disables shared folders, Vagrant mounts the project directory on the host as a writable vagrant directory on the guest virtual machine. This directory includes the project Vagrantfile configuration file. Ruby code within the Vagrantfile is loaded and executed when a user runs any vagrant command from the project directory on …

folder vagrant

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network AWS Cloud &Firewall Engineer

@ Arthur Grand Technologies Inc | Plano, TX, United States

Lead Consultant, Data Centre & BCP

@ Singtel | Singapore, Singapore

Protocol Security Engineer

@ Osmosis Labs | Remote

Technical Engineer - Payments Security Specialist

@ H&M Group | Bengaluru, India

Intern, Security Architecture

@ Sony | Work from Home-CA