Exploitation Basics
Reverse shell vs Bind shell
netcat
โก๏ธ netcat
Reverse shell - the victim/target connects back to the attacker
Attack machine - listening on a port
Target machine - connect to the attacker machine listening port


Bind shell - the attacker opens a port on the target (via exploitation) and connects to it
Attack machine - exploits target and opens port listening on target and connects to it
Target machine - listens for the attacker connection

Specially used on external assessment

Staged vs Non-Staged payloads
Non-Staged payload - sends exploit shellcode all at once, larger in size and won't always work
Metasploit e.g.
payload/windows/meterpreter_reverse_tcp
Staged payload - sends payload in stages, less stable
Metasploit e.g.
payload/windows/meterpreter/reverse_tcp
Metasploit (SMB attack)

This does not work, since it is using the
linux/x86/meterpreter/reverse_tcpstaged payload.Try with another payload

Gained reverse shell via Metasploit
Manual exploitation
Use OpenLuck to exploit CVE-2002-0082 - Apache mod_ssl < 2.8.7 OpenSSL - Remote Buffer Overflow
Follow usage instruction to compile the exploit and run it against the target machine

Brute force attacks
Brute-force attack
SSHwith weak/default credentials
hydra
โก๏ธ hydra
Use the same with Metasploit
Credential stuffing and Password spraying
Credential stuffing - injecting breached account credentials (leaks, etc) in hopes of account takeover
Password spraying - brute forcing logins based on a list of usernames with default passwords
Setup FoxyProxy in the browser and start BurpSuite.
Use local vulnerable webapp like dvwa
Open the login page - http://127.0.0.1:42001/vulnerabilities/brute/
BurpSuite
Turn intercept ON and send the login request to intruder
Highlight the username and password values, and add them to the payload positions
Attack type -
Pitchfork

Payloads
for each payload set, paste the usernames list and password
Start the attack
check the response for Status change and Length



Last updated
Was this helpful?