Type : Tutorial
Level : Medium
Victim O.S : Windows XPSP 3
- From Vulnerability Scanner, we found that the Linux machine that we have for test is vulnerable to FTP service. Now, we will use the exploit that can work for us. The command is − use “exploit path” The screen will appear as follows − Then type mfs show options in order to see what parameters you have to set in order to make it.
- There is exploit code circulating for a newly discovered vulnerability in the FTP service of Microsoft IIS, a flaw which could enable an attacker to run his own code on a remote server.
In the Group Policy Management Editor go to Computer configuration and click Administrative templates. Expand the tree to Windows components Windows Defender Exploit Guard Exploit Protection Use a common set of exploit protection settings. Click Enabled and type the location of.
Attacker O.S : Backtrack 5 R1
Vulnerability Application : Golden FTP Server 4.7.0
For you who have a web hosting maybe you will know or maybe you will rare to use FTPservice for your file transfer between your computer and your web server. When you can use FTP client like Filezilla, WSFTP, etc it's because on the other side there's an FTP server that act to serve/handle any incoming request to port 21(FTP). Golden FTP was one example from so many FTP server in the net.
But today we will not learn about how to use this kind of FTP server, but about vulnerability that found in Golden FTP server application that allow attacker to inject malicious script that caused attacker can get into the system.
Below was the explanation from metasploit.com about the module that can exploiting Golden FTP server 4.7.0 :
This module exploits a vulnerability in the Golden FTP service, using the PASS command to cause a buffer overflow. Please note that in order trigger the vulnerable code, the victim machine must have the 'Show new connections' setting enabled. By default, this option is unchecked.
Let's start the step by step how to perform this . . .
Requirements :
1. Metasploit Framework
2. Golden FTP Server 4.7.0
Step By Step :
1. Use the exploit module that already included in metasploit framework(if you cannot found this module, run msfupdate command).
2. To view the available switch for this exploit module, just run show options command. Here in this picture below I just set the required switch to perform this attack to the FTP server.
informations :
3. After everything set up correctly, now you need to choose your target. Run show targets command to view the available targets. In this tutorial my victim was using Windows XP Professional SP3, that's why I'm running set target 0 command.
4. Simple isn't it? 🙂 now run your exploit command to perform the attack.
PWNED!
We're already on victim machine.
If you want to do another thing inside victim machine, please read this tutorial that very useful for your knowledge.
Countermeasures :
1. Always update your software when there's an update.
Hope it's useful 🙂
Share this article if you found it was useful:
Blogger at hacking-tutorial.com. Love PHP, offensive security and web. Contact him at me[-at-]vishnuvalentino.com
Microsoft Ftp Service Exploit Tool
See all posts by Vishnu Valentino || Visit Website : http://www.vishnuvalentino.com
Newsletter
Subscribe to our Threatpost Today newsletter
Join thousands of people who receive the latest breaking cybersecurity news every day.
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Infosec Insider Post
Infosec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Sponsored Content
Microsoft Ftp Client
Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.