官术网_书友最值得收藏!

Phase-II: gaining access to the target

After completing the scanning stage, we know we have a single IP address, that is,

192.168.10.111, running HFS 2.3 file server and IIS 8.5 web services.

You must identify all the services running on all the open ports. We are focusing only on the HTTP-based services simply for the sake of an example.

The IIS 8.5 server is not known to have any severe vulnerabilities which may lead to the compromise of the entire system. Therefore, let us try finding an exploit for the HFS server. Metasploit offers a search command to search within modules. Let's find a matching module:

We can see that issuing the search HFS command, Metasploit found two matching modules. We can simply skip the first one as it doesn't correspond to the HFS server. Let's use the second one, as shown in the preceding screenshot. Next, we only need to set a few of the following options for the exploit module along with the payload:

Let's set the values for RHOST to 192.168.10.111, RPORT to 8080, payload to windows/meterpreter/reverse_tcp, SRVHOST to the IP address of our system, and LHOST to the IP address of our system. Setting the values, we can just issue the exploit command to send the exploit to the target, as shown in the following screenshot:

Yes! A meterpreter session opened! We have successfully gained access to the target machine. The HFS is vulnerable to remote command execution attack due to a poor regex in the file ParserLib.pas, and the exploit module exploits the HFS scripting commands by using %00 to bypass the filtering.

主站蜘蛛池模板: 伊金霍洛旗| 灵武市| 海阳市| 榆林市| 马龙县| 英山县| 布尔津县| 南昌县| 霍州市| 北碚区| 醴陵市| 桐乡市| 成都市| 聂拉木县| 亳州市| 沙雅县| 常熟市| 台东县| 榕江县| 辽中县| 句容市| 封丘县| 常宁市| 大新县| 蒲江县| 兴安县| 泸州市| 大竹县| 廉江市| 萍乡市| 岗巴县| 罗甸县| 宁南县| 富顺县| 德令哈市| 循化| 绍兴县| 东丰县| 乌审旗| 剑阁县| 枞阳县|