Powered by Blogger.
Home » » Learning Pentesting with Metasploitable3: (Exploiting WebDAV)

Learning Pentesting with Metasploitable3: (Exploiting WebDAV)

Written By Akademy on Tuesday, July 18, 2017 | 7:34 AM

Introduction:

In the third part of this series, we discussed how to exploit Metasploitable3 using a vulnerability in Elasticsearch 1.1.1. As mentioned in one of the previous articles, we will discuss multiple ways to gain access to Metasploitable3. In this article, we will exploit WebDAV vulnerability both manually and using the Metasploit framework.
As usual, let’s begin with the Information Gathered earlier. Following is the nmap output we have from Part 2 of this series.
Let us take a look at port 8585.
Nmap result shows that WebDAV extension is enabled on port 8585. If you never heard about WebDAV, this extension to the HTTP protocol allows creating, moving, copying, and deleting resources and collections on a remote web server. Enabling WebDAV is not a problem, but misconfigured WebDAV is what is really a problem.
Accessing the target IP on port 8585 shows the following.
It is WAMP server, and the default page is not removed.
Scrolling down the above page brings us to the following.
I was hoping that PHPMyAdmin is available and it may be exposed on all the interfaces, but it wasn’t. Accessing http://172.28.128.3:8585/phpmyadmin/ has shown the following.
Phpmyadmin binding might be done to localhost. But, let’s add this information to our Information Gathering notes. It may help us during post exploitation.
The above figure shows that we have two projects (uploads and WordPress).
We will discuss all the WordPress vulnerabilities in the next article. So, let’s focus on uploads here.

Exploiting WebDAV without Metasploit:

Accessing
http://172.28.128.3:8585/uploads/ shows up the following.
As we noticed WebDAV earlier, this could be the target directory on the server. Let’s do a quick check to see if we can upload any files into the directory.
We can use curl with PUT method for this. Let’s run the following command.
If the target server is misconfigured, the above command will create a new file called verify.txt in the uploads directory.
From the above figure, curl output shows that a file is created on the server.
Let’s check it in the browser.
Interesting. A file has been created on the server. This gives us the confirmation that we can upload files on to the server. Then, why wait? Let’s upload a shell.
Let’s create a simple PHP shell and name it cmd.php. The code looks as shown in the preceding excerpt.
<?php
$cmd=$_GET[‘cmd’]; 
echo system($cmd);
?>

Now, open up a terminal in Kali Linux and type the following command.
cadaver http://172.28.128.3:8585/uploads/
The above command uses a tool called cadaver. We are connecting to the target using cadaver. As no authentication is required, we will directly get a shell on uploads directory as shown in the preceding figure.

Nice, now all we are left with is, running the following command.
put [location of the shell on the local machine]
As we can see, a file is uploaded on to uploads directory of the remote machine.
Now, we can run arbitrary system commands on the target machine by accessing cmd.php in your browser. This looks as shown in the preceding figure.
whoami shows that we got a shell with nt authority\local service privileges.
hostname shows that we are on the metasploitable3 machine.

Exploiting WebDAV using Metasploit:

Some of you might be wondering how this can be achieved using Metasploit.
Metasploit has an auxiliary module for that. Run the following command to load http_put auxiliary module.
use auxiliary/scanner/http/http_put
Let’s copy cmd.php into /tmp folder and specify that as the FILEDATA.
After uploading, the FILENAME should be cmd.php
The preceding figure shows how these options are set in the auxiliary module. The remaining commands are self-explanatory.
ETHICAL HACKING TRAINING – RESOURCES (INFOSEC)
Share this article :

0 comments:

Post a Comment

 
Trung Tâm Đào Tạo An Toàn Thông Tin Học Hacker Mũ Xám Online | Học An Ninh Mạng Trực Tuyến | CEH VIỆT NAM
Copyright © 2013. HACKER MŨ XÁM - All Rights Reserved
Web Master @ Võ Sĩ Máy Tính
Contact @ Đông Dương ICT