官术网_书友最值得收藏!

  • Metasploit Bootcamp
  • Nipun Jaswal
  • 270字
  • 2021-07-09 21:00:04

Phase-II: gaining access to the target

After completing the scanning stage, we know we have a single IP address, that is,

192.168.10.111, running HFS 2.3 file server and IIS 8.5 web services.

You must identify all the services running on all the open ports. We are focusing only on the HTTP-based services simply for the sake of an example.

The IIS 8.5 server is not known to have any severe vulnerabilities which may lead to the compromise of the entire system. Therefore, let us try finding an exploit for the HFS server. Metasploit offers a search command to search within modules. Let's find a matching module:

We can see that issuing the search HFS command, Metasploit found two matching modules. We can simply skip the first one as it doesn't correspond to the HFS server. Let's use the second one, as shown in the preceding screenshot. Next, we only need to set a few of the following options for the exploit module along with the payload:

Let's set the values for RHOST to 192.168.10.111, RPORT to 8080, payload to windows/meterpreter/reverse_tcp, SRVHOST to the IP address of our system, and LHOST to the IP address of our system. Setting the values, we can just issue the exploit command to send the exploit to the target, as shown in the following screenshot:

Yes! A meterpreter session opened! We have successfully gained access to the target machine. The HFS is vulnerable to remote command execution attack due to a poor regex in the file ParserLib.pas, and the exploit module exploits the HFS scripting commands by using %00 to bypass the filtering.

主站蜘蛛池模板: 深水埗区| 田林县| 彩票| 容城县| 景德镇市| 丰台区| 阳城县| 榆树市| 丰城市| 儋州市| 额敏县| 通河县| 涿鹿县| 阿鲁科尔沁旗| 潍坊市| 浮梁县| 宣恩县| 城固县| 贵州省| 雷州市| 建宁县| 凌源市| 广宗县| 阿拉尔市| 民权县| 孝义市| 商南县| 清流县| 大埔区| 德化县| 华宁县| 汕尾市| 昭苏县| 信阳市| 堆龙德庆县| 马山县| 明溪县| 水富县| 安徽省| 富源县| 法库县|