{
	"id": "5582fd2c-59ee-467b-99cb-5f0d35b5ff04",
	"created_at": "2026-04-06T00:18:15.118789Z",
	"updated_at": "2026-04-10T03:21:41.124221Z",
	"deleted_at": null,
	"sha1_hash": "2dc2a8fc57d11a2e844035565739849e41084cbf",
	"title": "Rapid7",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 38520,
	"plain_text": "Rapid7\r\nBy Rapid7\r\nArchived: 2026-04-05 20:49:31 UTC\r\nmodule\r\nService Persistence\r\nDisclosed Created\r\nJan 1, 1983 May 30, 2018\r\nDisclosed\r\nJan 1, 1983\r\nCreated\r\nMay 30, 2018\r\nDescription\r\nThis module will create a service on the box, and mark it for auto-restart.\r\nWe need enough access to write service files and potentially restart services\r\nTargets:\r\nSystem V:\r\nCentOS\r\nDebian\r\nKali 2.0\r\nUbuntu\r\nUpstart:\r\nCentOS 6\r\nFedora \u003e= 9,\r\nUbuntu \u003e= 9.10,\r\nsystemd:\r\nCentOS 7\r\nDebian \u003e= 7,\r\nFedora \u003e= 15\r\nUbuntu \u003e= 15.04\r\nNote: System V won't restart the service if it dies, only an init change (reboot etc) will restart it.\r\nhttps://www.rapid7.com/db/modules/exploit/linux/local/service_persistence\r\nPage 1 of 2\n\nAuthors\r\nh00die mike@shorebreaksecurity.com\r\nCale Black\r\nPlatform\r\nLinux,Unix\r\nArchitectures\r\ncmd\r\nModule Options\r\nTo display the available options, load the module within the Metasploit console and run the commands 'show\r\noptions' or 'show advanced':\r\n msf \u003e use exploit/linux/local/service_persistence\r\n msf exploit(service_persistence) \u003e show targets\r\n ...targets...\r\n msf exploit(service_persistence) \u003e set TARGET \u003c target-id \u003e\r\n msf exploit(service_persistence) \u003e show options\r\n ...show and set options...\r\n msf exploit(service_persistence) \u003e exploit\r\nNEW\r\nExplore Exposure Command\r\nConfidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.\r\nSource: https://www.rapid7.com/db/modules/exploit/linux/local/service_persistence\r\nhttps://www.rapid7.com/db/modules/exploit/linux/local/service_persistence\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.rapid7.com/db/modules/exploit/linux/local/service_persistence"
	],
	"report_names": [
		"service_persistence"
	],
	"threat_actors": [],
	"ts_created_at": 1775434695,
	"ts_updated_at": 1775791301,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/2dc2a8fc57d11a2e844035565739849e41084cbf.pdf",
		"text": "https://archive.orkl.eu/2dc2a8fc57d11a2e844035565739849e41084cbf.txt",
		"img": "https://archive.orkl.eu/2dc2a8fc57d11a2e844035565739849e41084cbf.jpg"
	}
}