There is no excerpt because this is a protected post.
Starting with nmap. Scan all ports with masscan Doing another scan in open ports using default script. port 80 reveals Drupal website. Looking at CHANGELOG.txt we are using Drupal version 7.54. Simple Google searching, we found another exploit here. Oopss!! let me try that again. Sweet! I am iusr. what can I do?? Let’s grab […]
Starting with nmap Only three ports are open. On browsing http://10.10.10.11:8500 , we see two directories. These two folders represent ColdFusion. http://10.10.10.11:8500/CFIDE/administrator reveals following page: Coldfusion 6-10 is vulnerable to LFI attack. From the above screenshot, we know we have CF version is 8. We will use the following as suggested here. http://10.10.10.11/CFIDE/administrator/enter.cfm?locale=…………….\ColdFusion8\lib\password.properties%00en From above […]
While doing pentest it is important that you know the service that end machine is running. No matter what the victim machine OS (Linux/Windows) is we can use nmap to reveal the open ports and services. Lets start by doing simple nmap: If you do nmap and IP only then it will show above result […]
What to do if RDP (Remote Desktop) services stops and you are logged out from server? Solution: download pstools. PsTools is a set of utilities to perform all sorts of administration tasks both locally, and on remote computers as well. In this case we are going to start RDP service in remote windows server. In […]