Exploitation Basics
Last updated
Last updated
➡️ netcat
Reverse shell - the victim/target connects back to the attacker
Attack machine - listening on a port
Target machine - connect to the attacker machine listening port
Bind shell - the attacker opens a port on the target (via exploitation) and connects to it
Attack machine - exploits target and opens port listening on target and connects to it
Target machine - listens for the attacker connection
Specially used on external assessment
Non-Staged payload - sends exploit shellcode all at once, larger in size and won't always work
Metasploit e.g. payload/windows/meterpreter_reverse_tcp
Staged payload - sends payload in stages, less stable
Metasploit e.g. payload/windows/meterpreter/reverse_tcp
This does not work, since it is using the linux/x86/meterpreter/reverse_tcp
staged payload.
Try with another payload
Gained reverse shell via Metasploit
Use OpenLuck to exploit CVE-2002-0082 - Apache mod_ssl < 2.8.7 OpenSSL - Remote Buffer Overflow
Follow usage instruction to compile the exploit and run it against the target machine
Brute-force attack SSH
with weak/default credentials
➡️ hydra
Use the same with Metasploit
Credential stuffing - injecting breached account credentials (leaks, etc) in hopes of account takeover
Password spraying - brute forcing logins based on a list of usernames with default passwords
Setup FoxyProxy in the browser and start BurpSuite.
Use local vulnerable webapp like dvwa
Open the login page - http://127.0.0.1:42001/vulnerabilities/brute/
BurpSuite
Turn intercept ON and send the login request to intruder
Highlight the username and password values, and add them to the payload positions
Attack type - Pitchfork
Payloads
for each payload set, paste the usernames list and password
Start the attack
check the response for Status change and Length