Using HTTP

11 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$49.99
List Price:  $69.99
You save:  $20
€47.98
List Price:  €67.18
You save:  €19.19
£39.89
List Price:  £55.86
You save:  £15.96
CA$69.90
List Price:  CA$97.87
You save:  CA$27.96
A$76.87
List Price:  A$107.62
You save:  A$30.75
S$67.31
List Price:  S$94.24
You save:  S$26.93
HK$389.14
List Price:  HK$544.83
You save:  HK$155.68
CHF 44.67
List Price:  CHF 62.54
You save:  CHF 17.87
NOK kr553.51
List Price:  NOK kr774.97
You save:  NOK kr221.45
DKK kr357.84
List Price:  DKK kr501
You save:  DKK kr143.16
NZ$85.68
List Price:  NZ$119.95
You save:  NZ$34.27
د.إ183.61
List Price:  د.إ257.07
You save:  د.إ73.46
৳5,972.22
List Price:  ৳8,361.58
You save:  ৳2,389.36
₹4,221.07
List Price:  ₹5,909.84
You save:  ₹1,688.76
RM223.35
List Price:  RM312.71
You save:  RM89.36
₦84,627.22
List Price:  ₦118,484.88
You save:  ₦33,857.66
₨13,887.22
List Price:  ₨19,443.22
You save:  ₨5,556
฿1,722.96
List Price:  ฿2,412.28
You save:  ฿689.32
₺1,727.27
List Price:  ₺2,418.32
You save:  ₺691.05
B$289.99
List Price:  B$406.01
You save:  B$116.02
R905.58
List Price:  R1,267.89
You save:  R362.30
Лв93.83
List Price:  Лв131.37
You save:  Лв37.54
₩70,211.45
List Price:  ₩98,301.65
You save:  ₩28,090.20
₪185.06
List Price:  ₪259.10
You save:  ₪74.04
₱2,946.36
List Price:  ₱4,125.14
You save:  ₱1,178.78
¥7,736.95
List Price:  ¥10,832.35
You save:  ¥3,095.40
MX$1,021.22
List Price:  MX$1,429.79
You save:  MX$408.57
QR182.26
List Price:  QR255.18
You save:  QR72.92
P683.46
List Price:  P956.90
You save:  P273.44
KSh6,472.14
List Price:  KSh9,061.51
You save:  KSh2,589.37
E£2,482.01
List Price:  E£3,475.01
You save:  E£993
ብር6,118.22
List Price:  ብር8,566
You save:  ብር2,447.77
Kz45,640.87
List Price:  Kz63,900.87
You save:  Kz18,260
CLP$49,324.13
List Price:  CLP$69,057.73
You save:  CLP$19,733.60
CN¥362.07
List Price:  CN¥506.93
You save:  CN¥144.86
RD$3,012.01
List Price:  RD$4,217.06
You save:  RD$1,205.04
DA6,712.40
List Price:  DA9,397.90
You save:  DA2,685.50
FJ$113.77
List Price:  FJ$159.29
You save:  FJ$45.51
Q385.78
List Price:  Q540.13
You save:  Q154.34
GY$10,455.70
List Price:  GY$14,638.82
You save:  GY$4,183.11
ISK kr6,982.60
List Price:  ISK kr9,776.20
You save:  ISK kr2,793.60
DH502.76
List Price:  DH703.91
You save:  DH201.14
L910.90
List Price:  L1,275.33
You save:  L364.43
ден2,951.80
List Price:  ден4,132.76
You save:  ден1,180.95
MOP$400.70
List Price:  MOP$561.01
You save:  MOP$160.31
N$906.31
List Price:  N$1,268.91
You save:  N$362.60
C$1,838.97
List Price:  C$2,574.70
You save:  C$735.73
रु6,749.45
List Price:  रु9,449.77
You save:  रु2,700.32
S/189.51
List Price:  S/265.32
You save:  S/75.81
K201.21
List Price:  K281.71
You save:  K80.50
SAR187.68
List Price:  SAR262.77
You save:  SAR75.08
ZK1,382
List Price:  ZK1,934.92
You save:  ZK552.91
L238.86
List Price:  L334.42
You save:  L95.56
Kč1,216.06
List Price:  Kč1,702.59
You save:  Kč486.52
Ft19,746.05
List Price:  Ft27,646.05
You save:  Ft7,900
SEK kr551.69
List Price:  SEK kr772.42
You save:  SEK kr220.72
ARS$50,182.44
List Price:  ARS$70,259.44
You save:  ARS$20,076.99
Bs345.34
List Price:  Bs483.50
You save:  Bs138.16
COP$219,443.60
List Price:  COP$307,238.59
You save:  COP$87,794.99
₡25,456.77
List Price:  ₡35,641.51
You save:  ₡10,184.74
L1,262.95
List Price:  L1,768.23
You save:  L505.28
₲390,155.46
List Price:  ₲546,248.87
You save:  ₲156,093.40
$U2,130.69
List Price:  $U2,983.14
You save:  $U852.45
zł208.13
List Price:  zł291.40
You save:  zł83.27
Already have an account? Log In

Transcript

Hey guys. So in the previous video we saw how we can exploit shellshock vulnerability using Metasploit Framework. But in this video, I'm going to do the same thing. But I'll be sending an HTTP request with w get and curl instead, and exploit the shell. So first, we're going to do the same thing like how we did last time. So since we already have the file, the executable file which can be accessed from the attacker, machine browser, we will just going to go with that.

So in this case, I think I named it as a hack.sh. Let's see if I can still access it. Let's actually see the IP of the Metasploit able to, because 1921680 153 let's go back to Kali and try to access our file 192168 153 and it was in CGI bin pack.sh. Awesome, so we can still access it. That's perfect and sweet. exploit this.

So the easiest way to actually do this is to the easiest way to test a web server via HTTP request is to inject the bash command through the user agent itself. So what I'm trying to say is like, you know, trying to call, when you're trying to do a W get call, you can just inject the code right here itself. So I'm actually going to use the same code that I used to test out if the bash was vulnerable for Metasploit able to or not like in the previous video that I'm going to use the same code. So without just creating a function and putting a colon in there, to see if the code is the same. Then bash something, let's say vulnerable. machine which is 1921680 153.

Sure, there is one, which is very cool. And after that, I'm going to just put CGI bin. And hat.sh, which is actually the following. That should be the law. Yes. You got everything covered.

We have the colon. Okay, so I gotta put that up, close this out to perfect, enter. Awesome. So we are getting an internal server, this is actually a sign that the server is exploitable. So that's a good sign. If we get a 566 server error.

That means that the server is probably more mobile to an exploit. So yeah, that's good for us. Now we can do the same thing with a curl. You can just do the same thing, just get the same you can Copy Paste it when servers is using gash aids from Dasher, there's only difference. As you can see they're getting 500 server again internal server error 500 internal server that means the servers probably exploitable. That's basically what it means.

Now let's call it the double gates to swap out the user agent string, which actually shows some file details. So let's go with like a password file to do. So I'm going to do the same thing. W get view and open the brackets just chop the function. Instead of typing just colon, I'm gonna do something like test into it. And then close it out.

Echo and the content type here it's going to be text plain because we're trying to just output a text file which is a password text file. So it's gonna be content type. And we're gonna just say text plain and just close it up. And then your phone, forget your semicolons just echo it again acquit so that we can have that and then the path pin and we return a candidate. So basically we're gonna output it so we're going to put cat and then etc. Password fall back, and then the target machine ID and the path that's going to be 19216 a nine to one.

Let me see if the IP is still the same. Yes, okay. 123 150 and now it's gonna be CGI bin, packed dot close it out. Well, we're going to close anything because we already have it closed right here. Let's enter it. Awesome.

So we got to save that as a shot. Let's see if you got it actually saved. So let's type this Cat Cat got a search. Awesome. So as you can see we are all the password files. Using just an HTTP request, we were able to exploit the we're able to exploit the vulnerable machine which is about as portable to we can also do this like using a curl command.

So basically You can just do something like I'm sure. So we're gonna do something like with a curl command. So I'm going to do is like you can just do something like curl and the target machine which is 1921680 53. CGI, the same pap and pat.sh. And now answered for this particular thing we're gonna change a little bit because we because this curl command we got to do custom and ignore commands. So for that I was just gonna put dash edge and then custom Id and once we do that, we should be hearing hope.

Okay, so I'm going to start something. Let's see. So I got the opening open the brackets sheepy Gosh, we we've got that working. We open a custom ignore Oh, just that because I kept it together and I forgot to close it. That's why now it should work. There you go.

So as you can see, we got an internal error again. So using the code Come on instant, we got to work in. Now, let's try to do the same thing by trying to get the password file just like how we did for our other case with HTML. So I'm going to do curl. HTTP, the same target machine. So I'm just gonna actually copy paste operator.

This part and it's always good to like write it down all the time so that you can like, practice. But since I'm only doing it multiple times, we're just going to copy paste it and just do dash H is command for curl and then custom. And then the same thing, just close it back up, and ignored as well. We're going to be working with and a code contest. Type in this case is going to be the HTML text HTML file. So we got to put that I mentioned that just also it's not going to pop up and text HTML.

Okay, and now what else is locked so we got the path, we got the content, we got everything. Oh, we gotta put them we got to do the PAP of the password file. So let's first echo it real quick. And then put the path which has been and we want to cat it because we wanna show it we want to see what is in the file and then pass WD that should be so we got the call them closer to our attacker machine, got the script and then we got we ignored the command. we ignored it and then we got the echo and then can't interpret HTML. And then we got Condon type as bait, we got the echo and then we got the con gentleman being cat.

Yep, that looks good. Let's see if it works. So oops. That's that's not what it's supposed to do. Let's see curl. http 1968 2153.

Let's see if this part of this changed up the chain. So it's 135. So let's change it to 135. Now to work. Still not working. So I'm thinking there's something wrong with the code.

So I called it HTTP and then an edge custom The night. That's right. Oh, I forgot to put a cooler in their email semicolon. That's all the needs to just completely crush it up. But other than that, I think we're good. We have something else we have the HTML code, see?

Awesome. There you go. So we got all the password files and everything right here. And it just showed you how you can just use curl or w get to get and to exploit a vulnerable machine. I hope you enjoy this video. We'll see you in the next one.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.